uPress Payment Gateway Security & Risk Analysis

wordpress.org/plugins/wc-upress-gw

uPress Payment Gateway is a simple plugin which allows any user to start receiving credit card payments in a couple of button clicks.

40 active installs v1.7.8 PHP 5.6+ WP 4.0+ Updated Apr 21, 2020
credit-cardecommercepayment-gatewaywoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is uPress Payment Gateway Safe to Use in 2026?

Generally Safe

Score 85/100

uPress Payment Gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The wc-upress-gw plugin exhibits a generally good security posture based on the provided static analysis. The absence of reported vulnerabilities (CVEs) and a lack of critical or high-severity issues in taint analysis are positive indicators. The plugin also avoids common pitfalls like raw SQL queries and a large, unprotected attack surface, with zero AJAX handlers, REST API routes, or shortcodes that are not properly secured.

However, there are notable areas of concern. The most significant is the output escaping, where only 45% of outputs are properly escaped, leaving 55% potentially vulnerable to cross-site scripting (XSS) attacks. Additionally, all four analyzed taint flows resulted in unsanitized paths, which, while not classified as critical or high severity here, indicates a potential for vulnerabilities if the data sources or sanitization methods were to change or be exploited in unforeseen ways. The presence of an external HTTP request, while not inherently insecure, is a potential vector for supply chain attacks if the external service is compromised.

Given the clean vulnerability history, it's plausible that the identified output escaping and taint flow issues have not yet led to exploitable vulnerabilities, or have been mitigated by other factors. Nevertheless, the unescaped outputs represent a tangible risk. The overall assessment is that the plugin has strengths in its limited attack surface and SQL handling, but weaknesses in output sanitization and taint flow management that require attention to maintain a strong security posture.

Key Concerns

  • Insufficient output escaping
  • Taint flows with unsanitized paths
  • External HTTP request without clear context
Vulnerabilities
None known

uPress Payment Gateway Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

uPress Payment Gateway Release Timeline

v1.7.8Current
Code Analysis
Analyzed Apr 16, 2026

uPress Payment Gateway Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
16
13 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

45% escaped29 total outputs
Data Flows · Security
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
wc_upress_gw_init (wc-upress-gw.php:22)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

uPress Payment Gateway Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actioninitwc-upress-gw.php:20
actionadmin_noticeswc-upress-gw.php:33
actionwoocommerce_receipt_upress-maxwc-upress-gw.php:84
actionwoocommerce_update_options_payment_gatewayswc-upress-gw.php:85
actionwoocommerce_api_wc_urpess_maxwc-upress-gw.php:90
actionwoocommerce_api_wc_iframe_urpess_maxwc-upress-gw.php:91
actionwoocommerce_before_checkout_formwc-upress-gw.php:92
filterwoocommerce_payment_gatewayswc-upress-gw.php:630
actionadmin_noticeswc-upress-gw.php:700
actionplugins_loadedwc-upress-gw.php:703
Maintenance & Trust

uPress Payment Gateway Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedApr 21, 2020
PHP min version5.6
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

uPress Payment Gateway Developer Profile

SecuPress

5 plugins · 64K total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
156 days
View full developer profile
Detection Fingerprints

How We Detect uPress Payment Gateway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wc-upress-gw/css/style.css/wp-content/plugins/wc-upress-gw/js/custom.js

HTML / DOM Fingerprints

CSS Classes
wc-upress-gw-woocommerce-inactive-notice
HTML Comments
<!-- The following is to make sure that we do not overload the server for those customers that have multiple payment modules enabled --><!-- Need to make sure that there is an admin setting which allows us to set the payment method to default to the same order as the country --><!-- Need to make sure that the same payment method is not used too often --><!-- Payment Method by uPress
Data Attributes
name="uPressMAX"id="uPressMAX"name="Masof"name="Amount"name="Info"name="Order"+20 more
REST Endpoints
/wc_api/wc_upress_max/wc_api/wc_iframe_urpess_max
FAQ

Frequently Asked Questions about uPress Payment Gateway