
WorldPay Hosted Payment Gateway Security & Risk Analysis
wordpress.org/plugins/woo-worldpay-hosted-payment-gatewayCustom worldpay payment gateway for your woocommerce based site.
Is WorldPay Hosted Payment Gateway Safe to Use in 2026?
Generally Safe
Score 85/100WorldPay Hosted Payment Gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin 'woo-worldpay-hosted-payment-gateway' v1.0.18 presents a mixed security posture. On the positive side, there are no reported CVEs, indicating a historical absence of publicly disclosed vulnerabilities. Furthermore, all SQL queries are prepared, which is a strong defense against SQL injection. The attack surface appears minimal with no AJAX handlers, REST API routes, shortcodes, or cron events, and all present entry points are protected. However, a significant concern arises from the static analysis of the code signals, specifically the output escaping. With 4 total outputs and 0% properly escaped, there is a high risk of cross-site scripting (XSS) vulnerabilities. This is further amplified by the taint analysis, which reveals 2 flows with unsanitized paths. While these flows are not categorized as critical or high severity, the presence of unsanitized paths is a direct indicator of potential XSS or other injection vulnerabilities that could be exploited if they lead to output. The lack of nonce checks and capability checks on any entry points, though the attack surface is reported as zero, could become a risk if the attack surface grows in future versions without corresponding security updates.
In conclusion, while the plugin benefits from a clean vulnerability history and secure database practices, the identified issues with output escaping and unsanitized taint flows represent significant weaknesses. The lack of proper output sanitization is a direct gateway for XSS attacks, and the unsanitized paths in the taint analysis highlight potential injection risks that require immediate attention. The absence of explicit capability and nonce checks, while currently mitigated by the zero attack surface, should be monitored in future updates. Addressing these output and taint issues is crucial for improving the plugin's security.
Key Concerns
- Output escaping not implemented
- Unsanitized paths in taint flows
- No nonce checks
- No capability checks
WorldPay Hosted Payment Gateway Security Vulnerabilities
WorldPay Hosted Payment Gateway Code Analysis
Output Escaping
Data Flow Analysis
WorldPay Hosted Payment Gateway Attack Surface
WordPress Hooks 5
Maintenance & Trust
WorldPay Hosted Payment Gateway Maintenance & Trust
Maintenance Signals
Community Trust
WorldPay Hosted Payment Gateway Alternatives
LightStart – Maintenance Mode, Coming Soon and Landing Page Builder
wp-maintenance-mode
Easy Drag & Drop Page Builder that adds a splash page to your site that it's perfect for a coming soon page, maintenance or landing page.
Adminimize
adminimize
Adminimize that lets you hide 'unnecessary' items from the WordPress backend
Remove Dashboard Access
remove-dashboard-access-for-non-admins
Disable Dashboard access for users of a specific role or capability. Disallowed users are redirected to a chosen URL. Get set up in seconds.
Error Log Monitor
error-log-monitor
Adds a Dashboard widget that displays the latest messages from your PHP error log. It can also send logged errors to email.
Amazon Pay for WooCommerce
woocommerce-gateway-amazon-payments-advanced
Install the Amazon Pay plugin for your WooCommerce store and take advantage of a seamless checkout experience
WorldPay Hosted Payment Gateway Developer Profile
2 plugins · 100 total installs
How We Detect WorldPay Hosted Payment Gateway
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/worldpay/worldpay-style.csshttps://payments.worldpay.com/resources/hpp/integrations/embedded/js/hpp-embedded-integration-library.jsHTML / DOM Fingerprints
custom-worldpay-htmliframeIntegrationIdiframeHelperURLiframeBaseURLtargetcustomOptionsWPCLlibraryObject