
MTN MOMO Security & Risk Analysis
wordpress.org/plugins/wp-mtn-momoMTN MOMO is a plugin to help you make transactions via MTN mobile money.
Is MTN MOMO Safe to Use in 2026?
Generally Safe
Score 85/100MTN MOMO has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wp-mtn-momo" v0.0.1 plugin exhibits a concerning security posture, primarily due to a significant number of unprotected entry points. With 5 out of 6 total entry points lacking authentication checks, the plugin presents a broad attack surface that could be exploited by unauthenticated users. The static analysis also highlights issues with output escaping, where only 33% of outputs are properly escaped, increasing the risk of cross-site scripting (XSS) vulnerabilities. While the absence of dangerous functions, SQL injection vulnerabilities (57% prepared statements), and critical taint flows is positive, the lack of capability checks on any entry points is a major weakness.
The vulnerability history shows no known CVEs, which is a positive indicator. However, the absence of past vulnerabilities, especially in conjunction with the current code analysis findings, does not necessarily guarantee future security. It could simply mean the plugin hasn't been thoroughly analyzed or targeted yet. The plugin's early version (0.0.1) also suggests it might be incomplete or undergoing active development, which often correlates with higher security risks due to rushed development practices.
In conclusion, while the plugin avoids some critical vulnerabilities like dangerous functions and raw SQL, its significant number of unprotected AJAX handlers and REST API routes, coupled with poor output escaping, creates substantial security risks. The lack of any capability checks on its entry points is a critical oversight. Developers should prioritize implementing robust authentication and authorization for all exposed functionalities and thoroughly review output escaping to mitigate potential XSS and other injection attacks.
Key Concerns
- Unprotected AJAX handlers
- Unprotected REST API routes
- Low output escaping percentage
- No capability checks on entry points
MTN MOMO Security Vulnerabilities
MTN MOMO Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
MTN MOMO Attack Surface
AJAX Handlers 4
REST API Routes 1
Shortcodes 1
WordPress Hooks 4
Maintenance & Trust
MTN MOMO Maintenance & Trust
Maintenance Signals
Community Trust
MTN MOMO Alternatives
Gateway Payougo Checkout
gateway-payougo-checkout
With Payougo, easyly accept secure Orange Money & MTN Mobile Money payments from Cameroon subscribers on your web store.
Campay Woocommerce Payment Gateway
campay-api
CamPay is a Fintech service of the company TAKWID
Checkout with Mobile Money, Western Union, WorldRemit, WorldRemit
momo-mobile-money-payments-woocommerce-extension
Receive mobile money, Western Union, WorldRemit payments from any country and carrier on your website with WooCommerce + MOMO
CamooPay for e-Commerce – Mobile Money Gateway
camoo-pay-for-ecommerce
A secure and seamless plugin to receive and manage Cash, Mobile, and Card payments in Cameroon on your e-shop or website
CamPay Give Donation Payment Gateway
campay-give
CamPay is a Fintech service of the company TAKWID
MTN MOMO Developer Profile
1 plugin · 10 total installs
How We Detect MTN MOMO
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-mtn-momo/assets/css/mtn-momo.css/wp-content/plugins/wp-mtn-momo/assets/js/mtn-momo.js/wp-content/plugins/wp-mtn-momo/assets/js/mtn-momo.jswp-mtn-momo/assets/css/mtn-momo.css?ver=wp-mtn-momo/assets/js/mtn-momo.js?ver=HTML / DOM Fingerprints
<!-- MTN MOMO plugin for WordPress --><!-- Store name: Identifies your store to the payee. --><!-- providerCallbackHost --><!-- Ocp-Apim-Subscription-Key -->+9 moredata-mtn-momo-transaction-idmtn_momo_ajax_object/wp-json/mtn-momo/v1/transaction[mtn_momo_greeting]