MultiVendorX Razorpay Split Payment Security & Risk Analysis

wordpress.org/plugins/wcmp-razorpay-split-payment

The much awaited MVX Razorpay Split Payment is now live.

10 active installs v1.0.2 PHP + WP 4.2+ Updated Oct 19, 2022
commissionmultivendorxmvxrazorpay-checkout-gatewayvendor
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is MultiVendorX Razorpay Split Payment Safe to Use in 2026?

Generally Safe

Score 85/100

MultiVendorX Razorpay Split Payment has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The wcmp-razorpay-split-payment plugin v1.0.2 exhibits a generally good security posture with no known vulnerabilities in its history and a limited attack surface. The static analysis reveals no dangerous functions, no direct SQL queries (all prepared), and no external HTTP requests, which are all positive signs. However, there are areas for improvement that present potential risks.

The primary concern lies in the output escaping. With 7 total outputs and only 43% properly escaped, there's a significant chance of cross-site scripting (XSS) vulnerabilities if the unescaped outputs contain user-supplied data. Additionally, the absence of nonce checks and capability checks on any potential entry points, though the attack surface is reported as zero, raises a flag. If any entry points were to be introduced or discovered, they would be unprotected.

Given the complete lack of recorded vulnerabilities, the plugin's history doesn't indicate any past weaknesses. However, the current code analysis highlights the potential for XSS and the lack of robust authorization for any hypothetical future entry points. The overall conclusion is that the plugin is currently safe based on its history, but the identified code-level weaknesses, particularly in output escaping, require attention to maintain a strong security posture.

Key Concerns

  • Insufficient output escaping
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

MultiVendorX Razorpay Split Payment Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

MultiVendorX Razorpay Split Payment Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

43% escaped7 total outputs
Attack Surface

MultiVendorX Razorpay Split Payment Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 18
filterautomatic_payment_methodclasses\class-mvx-razorpay-checkout-gateway-admin.php:6
filtermvx_vendor_payment_modeclasses\class-mvx-razorpay-checkout-gateway-admin.php:7
filtersettings_vendors_payment_tab_optionsclasses\class-mvx-razorpay-checkout-gateway-admin.php:8
actionsettings_page_payment_razorpay_tab_initclasses\class-mvx-razorpay-checkout-gateway-admin.php:9
filtermvx_tabsection_paymentclasses\class-mvx-razorpay-checkout-gateway-admin.php:10
filtermvx_vendor_user_fieldsclasses\class-mvx-razorpay-checkout-gateway-admin.php:11
actionmvx_after_vendor_billingclasses\class-mvx-razorpay-checkout-gateway-admin.php:12
actioninitclasses\class-mvx-razorpay-checkout-gateway.php:23
filtermvx_multi_tab_array_listclasses\class-mvx-razorpay-checkout-gateway.php:24
filtermvx_settings_fields_detailsclasses\class-mvx-razorpay-checkout-gateway.php:25
filtermvx_payment_gatewaysclasses\class-mvx-razorpay-checkout-gateway.php:89
actionplugins_loadedclasses\class-mvx-razorpay-checkout-payment.php:9
actionadmin_post_nopriv_rzp_wc_webhookclasses\class-mvx-razorpay-checkout-payment.php:10
actioninitclasses\class-mvx-razorpay-checkout-payment.php:140
actionwoocommerce_update_options_payment_gatewaysclasses\class-mvx-razorpay-checkout-payment.php:154
filterwoocommerce_payment_gatewaysclasses\class-mvx-razorpay-checkout-payment.php:1046
actionadmin_noticesmvx-razorpay-checkout-gateway.php:32
actionadmin_noticesmvx-razorpay-checkout-gateway.php:36
Maintenance & Trust

MultiVendorX Razorpay Split Payment Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedOct 19, 2022
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

MultiVendorX Razorpay Split Payment Developer Profile

MultiVendorX

5 plugins · 13K total installs

74
trust score
Avg Security Score
93/100
Avg Patch Time
271 days
View full developer profile
Detection Fingerprints

How We Detect MultiVendorX Razorpay Split Payment

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wcmp-razorpay-split-payment/assets/css/mvx-razorpay-checkout-gateway.css/wp-content/plugins/wcmp-razorpay-split-payment/assets/js/mvx-razorpay-checkout-gateway.js/wp-content/plugins/wcmp-razorpay-split-payment/assets/js/mvx-razorpay-checkout-script.js
Version Parameters
/wp-content/plugins/wcmp-razorpay-split-payment/assets/css/mvx-razorpay-checkout-gateway.css?ver=/wp-content/plugins/wcmp-razorpay-split-payment/assets/js/mvx-razorpay-checkout-gateway.js?ver=/wp-content/plugins/wcmp-razorpay-split-payment/assets/js/mvx-razorpay-checkout-script.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-razorpay-key-iddata-razorpay-amountdata-razorpay-order-iddata-razorpay-currencydata-razorpay-imagedata-razorpay-name+8 more
JS Globals
Razorpaymvx_razorpay_checkout_params
Shortcode Output
[mvx_razorpay_payment]
FAQ

Frequently Asked Questions about MultiVendorX Razorpay Split Payment