Touchsuite Payments Security & Risk Analysis

wordpress.org/plugins/touchsuite-payments

Build a membership site that grows with you: user registration, member profiles, free or paid subscriptions.

0 active installs v1.0.5 PHP 8.0+ WP 6.6+ Updated Unknown
communitymembermembershipsuser-profileuser-registration
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Touchsuite Payments Safe to Use in 2026?

Generally Safe

Score 100/100

Touchsuite Payments has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "touchsuite-payments" plugin v1.0.5 presents a mixed security posture. On the positive side, the plugin demonstrates strong secure coding practices with 100% of SQL queries utilizing prepared statements and an excellent 98% of output properly escaped. The absence of dangerous functions, file operations, and external HTTP requests further contributes to a reduced risk profile. Furthermore, the plugin has no known vulnerabilities (CVEs) in its history, suggesting a generally well-maintained codebase.

However, a significant concern arises from the plugin's attack surface. All four identified AJAX handlers lack authentication checks, making them prime targets for unauthorized access and potentially leading to actions being performed without user consent. While the taint analysis found no critical or high severity issues, the unprotected AJAX endpoints could still be exploited if they interact with sensitive data or functionality. The plugin's vulnerability history is clean, which is a positive indicator, but the lack of authentication on entry points remains a notable weakness that could be leveraged.

In conclusion, while the "touchsuite-payments" plugin exhibits good practices in areas like SQL and output handling, the unprotected AJAX endpoints represent a substantial security risk. This lack of authorization on critical entry points significantly undermines the plugin's overall security, despite its otherwise clean vulnerability record and secure internal coding.

Key Concerns

  • AJAX handlers without authentication checks
Vulnerabilities
None known

Touchsuite Payments Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Touchsuite Payments Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
16 prepared
Unescaped Output
9
414 escaped
Nonce Checks
31
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared16 total queries

Output Escaping

98% escaped423 total outputs
Data Flows
All sanitized

Data Flow Analysis

5 flows
save (admin\settings\page-smtp.php:31)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
4 unprotected

Touchsuite Payments Attack Surface

Entry Points4
Unprotected4

AJAX Handlers 4

authwp_ajax_tspay_apply_discountincludes\ajax.php:4
noprivwp_ajax_tspay_apply_discountincludes\ajax.php:5
authwp_ajax_tspay_paymentincludes\ajax.php:7
noprivwp_ajax_tspay_paymentincludes\ajax.php:8
WordPress Hooks 28
actionadmin_initadmin\admin.php:15
actionadmin_menuadmin\admin.php:27
filteradd_menu_classesadmin\admin.php:29
filtersubmenu_fileadmin\admin.php:31
actionadmin_enqueue_scriptsadmin\admin.php:33
filtershow_admin_baradmin\admin.php:38
actionadmin_initadmin\admin.php:44
actionadmin_initadmin\admin.php:54
filterlogin_errorsfrontend\shortcodes\login.php:18
filterlogin_redirectfrontend\shortcodes\login.php:19
actionwp_enqueue_scriptsfrontend\shortcodes\shortcodes.php:19
actionwp_login_failedfrontend\shortcodes\shortcodes.php:41
filterauthenticatefrontend\shortcodes\shortcodes.php:42
actioninitfrontend\shortcodes\shortcodes.php:44
filterdisplay_post_statesincludes\adding-pages.php:19
actioninitincludes\custom-entities.php:7
actionshow_user_profileincludes\functions.php:17
actionedit_user_profileincludes\functions.php:18
actionuser_new_formincludes\functions.php:19
actionpersonal_options_updateincludes\functions.php:72
actionedit_user_profile_updateincludes\functions.php:73
actionuser_registerincludes\functions.php:74
filterwp_redirectincludes\functions.php:95
actioninitincludes\functions.php:122
filterthe_contentincludes\middleware.php:57
actionwpincludes\middleware.php:198
actionphpmailer_initincludes\smtp\smtp.php:10
actionplugins_loadedtouchsuite-payments.php:34
Maintenance & Trust

Touchsuite Payments Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedUnknown
PHP min version8.0
Downloads835

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Touchsuite Payments Developer Profile

TouchSuite

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Touchsuite Payments

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/touchsuite-payments/admin/assets/js/script.js/wp-content/plugins/touchsuite-payments/admin/assets/css/style.css/wp-content/plugins/touchsuite-payments/frontend/assets/js/script.js/wp-content/plugins/touchsuite-payments/frontend/assets/css/style.css
Script Paths
/wp-content/plugins/touchsuite-payments/admin/assets/js/script.js/wp-content/plugins/touchsuite-payments/frontend/assets/js/script.js
Version Parameters
touchsuite-payments/admin/assets/js/script.js?ver=touchsuite-payments/admin/assets/css/style.css?ver=touchsuite-payments/frontend/assets/js/script.js?ver=touchsuite-payments/frontend/assets/css/style.css?ver=

HTML / DOM Fingerprints

JS Globals
Ajax
Shortcode Output
[login][signup][profile][account]
FAQ

Frequently Asked Questions about Touchsuite Payments