MTN MOMO Security & Risk Analysis

wordpress.org/plugins/wp-mtn-momo

MTN MOMO is a plugin to help you make transactions via MTN mobile money.

10 active installs v0.0.1 PHP 5.3.6+ WP 5.3+ Updated Jun 4, 2020
mobilemobile-moneymomomoneymtn
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is MTN MOMO Safe to Use in 2026?

Generally Safe

Score 85/100

MTN MOMO has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "wp-mtn-momo" v0.0.1 plugin exhibits a concerning security posture, primarily due to a significant number of unprotected entry points. With 5 out of 6 total entry points lacking authentication checks, the plugin presents a broad attack surface that could be exploited by unauthenticated users. The static analysis also highlights issues with output escaping, where only 33% of outputs are properly escaped, increasing the risk of cross-site scripting (XSS) vulnerabilities. While the absence of dangerous functions, SQL injection vulnerabilities (57% prepared statements), and critical taint flows is positive, the lack of capability checks on any entry points is a major weakness.

The vulnerability history shows no known CVEs, which is a positive indicator. However, the absence of past vulnerabilities, especially in conjunction with the current code analysis findings, does not necessarily guarantee future security. It could simply mean the plugin hasn't been thoroughly analyzed or targeted yet. The plugin's early version (0.0.1) also suggests it might be incomplete or undergoing active development, which often correlates with higher security risks due to rushed development practices.

In conclusion, while the plugin avoids some critical vulnerabilities like dangerous functions and raw SQL, its significant number of unprotected AJAX handlers and REST API routes, coupled with poor output escaping, creates substantial security risks. The lack of any capability checks on its entry points is a critical oversight. Developers should prioritize implementing robust authentication and authorization for all exposed functionalities and thoroughly review output escaping to mitigate potential XSS and other injection attacks.

Key Concerns

  • Unprotected AJAX handlers
  • Unprotected REST API routes
  • Low output escaping percentage
  • No capability checks on entry points
Vulnerabilities
None known

MTN MOMO Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

MTN MOMO Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
4 prepared
Unescaped Output
18
9 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
7
Bundled Libraries
0

SQL Query Safety

57% prepared7 total queries

Output Escaping

33% escaped27 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<sandbox> (pages\sandbox.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
5 unprotected

MTN MOMO Attack Surface

Entry Points6
Unprotected5

AJAX Handlers 4

authwp_ajax_get_configurationswp-mtn-momo.php:65
noprivwp_ajax_get_configurationswp-mtn-momo.php:67
authwp_ajax_get_transaction_statuswp-mtn-momo.php:69
noprivwp_ajax_get_transaction_statuswp-mtn-momo.php:71

REST API Routes 1

PUT/wp-json/mtn-momo/v1/transactionclass.rest-api.php:16

Shortcodes 1

[mtn_momo_greeting] wp-mtn-momo.php:73
WordPress Hooks 4
filterhttp_responsewp-mtn-momo.php:57
actionadmin_menuwp-mtn-momo.php:59
actionadmin_enqueue_scriptswp-mtn-momo.php:61
actionrest_api_initwp-mtn-momo.php:63
Maintenance & Trust

MTN MOMO Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedJun 4, 2020
PHP min version5.3.6
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

MTN MOMO Developer Profile

bmatovu

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MTN MOMO

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-mtn-momo/assets/css/mtn-momo.css/wp-content/plugins/wp-mtn-momo/assets/js/mtn-momo.js
Script Paths
/wp-content/plugins/wp-mtn-momo/assets/js/mtn-momo.js
Version Parameters
wp-mtn-momo/assets/css/mtn-momo.css?ver=wp-mtn-momo/assets/js/mtn-momo.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- MTN MOMO plugin for WordPress --><!-- Store name: Identifies your store to the payee. --><!-- providerCallbackHost --><!-- Ocp-Apim-Subscription-Key -->+9 more
Data Attributes
data-mtn-momo-transaction-id
JS Globals
mtn_momo_ajax_object
REST Endpoints
/wp-json/mtn-momo/v1/transaction
Shortcode Output
[mtn_momo_greeting]
FAQ

Frequently Asked Questions about MTN MOMO