
WePay WordPress Plugin Security & Risk Analysis
wordpress.org/plugins/wepay-wordpress-pluginAllows you to use a Wepay account to accept payments easily online thru your wordpress installation. Easy install, drag and drop.
Is WePay WordPress Plugin Safe to Use in 2026?
Generally Safe
Score 85/100WePay WordPress Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wepay-wordpress-plugin" v1.5 plugin exhibits a mixed security posture. On the positive side, it has a very small attack surface with only one shortcode and no AJAX handlers or REST API routes. Furthermore, all SQL queries are properly prepared, and there are no known CVEs or historical vulnerabilities, suggesting a generally stable and well-maintained codebase. This history of no reported issues is a strong indicator of good security practices in the past.
However, there are significant concerns identified in the static analysis. The presence of the `create_function` is a dangerous function that can lead to remote code execution if not handled with extreme care and proper sanitization, which is notably absent for outputs. A critical finding is that 0% of the 30 output points are properly escaped, posing a high risk of cross-site scripting (XSS) vulnerabilities. The lack of nonce checks on the single shortcode, combined with unescaped output, presents a direct path for malicious actors to inject harmful scripts and potentially exploit the `create_function` if user input can be directed to it.
In conclusion, while the plugin benefits from a limited attack surface and a clean vulnerability history, the critical findings regarding unescaped output and the use of a dangerous function without apparent safeguards create a substantial security risk. The lack of nonce checks further exacerbates these issues, making it susceptible to XSS attacks. The plugin requires immediate attention to address these critical code-level weaknesses.
Key Concerns
- Dangerous function (create_function) used
- 0% of outputs properly escaped (XSS risk)
- No nonce checks on shortcode entry point
- External HTTP requests without explicit checks
WePay WordPress Plugin Security Vulnerabilities
WePay WordPress Plugin Code Analysis
Dangerous Functions Found
Output Escaping
WePay WordPress Plugin Attack Surface
Shortcodes 1
WordPress Hooks 5
Maintenance & Trust
WePay WordPress Plugin Maintenance & Trust
Maintenance Signals
Community Trust
WePay WordPress Plugin Alternatives
WP Thumbs Plugin
wp-thumbs
WP Thumbs is a voting plugin that allows users to like or dislike posts and pages. There are many customization options.
WePay Woocommerce addon
woo-payment-addon
This plugin is an addon for WooCommerce to implement a payment gateway method for accepting Credit Cards Payments By merchants via WePay Payment Gatew …
Crowdfunding WePay oAuth 2.0 by Astoundify
edd-wepay-oauth2
Add WePay oAuth2 support for Easy Digital Downloads WePay and Crowdfunding by Astoundify.
WePay WordPress Plugin Developer Profile
2 plugins · 20 total installs
How We Detect WePay WordPress Plugin
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wepay-wordpress-plugin/wepaysdk.php/wp-content/plugins/wepay-wordpress-plugin/wepay-assets/wepay.css/wp-content/plugins/wepay-wordpress-plugin/wepay-assets/wepay.jswepay-wordpress-plugin/wepay-assets/wepay.css?ver=wepay-wordpress-plugin/wepay-assets/wepay.js?ver=HTML / DOM Fingerprints
wepay-button<!-- Wepay Plugin: You have not set your client ID, client secret and access token yet. Please do so now, click here. -->data-wepay-account-iddata-wepay-access-tokendata-wepay-client-iddata-wepay-amountdata-wepay-descriptiondata-wepay-fee-payer+4 moreWepay[wepay text="Buy Now" amount="1.00" sdesc="testing" css="buttoncss" feepayer="Payee"]