WorldPay Hosted Payment Gateway Security & Risk Analysis

wordpress.org/plugins/woo-worldpay-hosted-payment-gateway

Custom worldpay payment gateway for your woocommerce based site.

100 active installs v1.0.18 PHP + WP 4.5+ Updated Oct 5, 2020
adminadministrationcheckoutpaymentworldpay
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WorldPay Hosted Payment Gateway Safe to Use in 2026?

Generally Safe

Score 85/100

WorldPay Hosted Payment Gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The plugin 'woo-worldpay-hosted-payment-gateway' v1.0.18 presents a mixed security posture. On the positive side, there are no reported CVEs, indicating a historical absence of publicly disclosed vulnerabilities. Furthermore, all SQL queries are prepared, which is a strong defense against SQL injection. The attack surface appears minimal with no AJAX handlers, REST API routes, shortcodes, or cron events, and all present entry points are protected. However, a significant concern arises from the static analysis of the code signals, specifically the output escaping. With 4 total outputs and 0% properly escaped, there is a high risk of cross-site scripting (XSS) vulnerabilities. This is further amplified by the taint analysis, which reveals 2 flows with unsanitized paths. While these flows are not categorized as critical or high severity, the presence of unsanitized paths is a direct indicator of potential XSS or other injection vulnerabilities that could be exploited if they lead to output. The lack of nonce checks and capability checks on any entry points, though the attack surface is reported as zero, could become a risk if the attack surface grows in future versions without corresponding security updates.

In conclusion, while the plugin benefits from a clean vulnerability history and secure database practices, the identified issues with output escaping and unsanitized taint flows represent significant weaknesses. The lack of proper output sanitization is a direct gateway for XSS attacks, and the unsanitized paths in the taint analysis highlight potential injection risks that require immediate attention. The absence of explicit capability and nonce checks, while currently mitigated by the zero attack surface, should be monitored in future updates. Addressing these output and taint issues is crucial for improving the plugin's security.

Key Concerns

  • Output escaping not implemented
  • Unsanitized paths in taint flows
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

WorldPay Hosted Payment Gateway Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WorldPay Hosted Payment Gateway Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
whpg_load_payment_iframe (worldpay.php:37)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WorldPay Hosted Payment Gateway Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterwoocommerce_payment_gatewaysworldpay.php:12
actionwp_enqueue_scriptsworldpay.php:26
actionwp_footerworldpay.php:36
actionplugins_loadedworldpay.php:72
actionadmin_noticesworldpay.php:94
Maintenance & Trust

WorldPay Hosted Payment Gateway Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedOct 5, 2020
PHP min version
Downloads11K

Community Trust

Rating20/100
Number of ratings3
Active installs100
Developer Profile

WorldPay Hosted Payment Gateway Developer Profile

Priyank Patel

2 plugins · 100 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WorldPay Hosted Payment Gateway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/worldpay/worldpay-style.css
Script Paths
https://payments.worldpay.com/resources/hpp/integrations/embedded/js/hpp-embedded-integration-library.js

HTML / DOM Fingerprints

CSS Classes
custom-worldpay-html
Data Attributes
iframeIntegrationIdiframeHelperURLiframeBaseURLtarget
JS Globals
customOptionsWPCLlibraryObject
FAQ

Frequently Asked Questions about WorldPay Hosted Payment Gateway