WP Payment Security & Risk Analysis

wordpress.org/plugins/wp-payment

Get recurring and onetime payments with PayPal, Authorize.NET and Stripe.

20 active installs v2.3.0 PHP + WP 3.0.1+ Updated Jan 31, 2025
credit-card-paymentpaypal-onsite-paymentpaypal-prorecurring-billingstripe-payment
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Payment Safe to Use in 2026?

Generally Safe

Score 92/100

WP Payment has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "wp-payment" v2.3.0 plugin exhibits a mixed security posture. On the positive side, the plugin has a very small attack surface, with only one shortcode and no AJAX handlers, REST API routes, or cron events that are exposed externally. Furthermore, all SQL queries are properly prepared, indicating a good understanding of database security practices. The absence of known CVEs and a clean vulnerability history suggests that the plugin has generally been developed with security in mind. However, significant concerns arise from the code analysis. The output escaping is alarmingly low at 49%, meaning nearly half of all outputs are potentially vulnerable to cross-site scripting (XSS) attacks. Compounding this is the complete lack of nonce checks and capability checks, leaving even the single entry point (the shortcode) and any potential internal functions exposed to unauthorized actions and privilege escalation. The presence of file operations and external HTTP requests, while not inherently risky, requires careful scrutiny in conjunction with the other identified weaknesses.

While the plugin's small attack surface and SQL hygiene are commendable strengths, the pervasive issues with output escaping and the complete absence of nonce and capability checks represent critical vulnerabilities. These omissions significantly increase the risk of XSS attacks and unauthorized operations. The plugin's clean vulnerability history is a positive sign, but it does not mitigate the immediate risks identified in the current static analysis. A balanced conclusion is that this plugin, despite its clean history, requires urgent attention to address the critical output escaping and authorization bypass vulnerabilities before it can be considered secure.

Key Concerns

  • Low output escaping percentage
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP Payment Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Payment Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
59
56 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
4
Bundled Libraries
0

Output Escaping

49% escaped115 total outputs
Attack Surface

WP Payment Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[WP_PAYMENT_FORM] wp-payment.php:97
WordPress Hooks 15
actionadmin_initadmin-settings.php:55
actionadmin_menuadmin-settings.php:57
filterpost_row_actionsadmin-settings.php:684
filterpost_updated_messagesadmin-settings.php:695
filtermanage_paymentsubmission_posts_columnsadmin-settings.php:719
actionmanage_paymentsubmission_posts_custom_columnadmin-settings.php:744
actionadmin_head-post.phpadmin-settings.php:759
actionadmin_head-post-new.phpadmin-settings.php:760
actionadd_meta_boxesadmin-settings.php:763
actionelementor/widgets/widgets_registeredblock\wp-elem-app-wdget.php:18
actionenqueue_block_editor_assetsblock\wp-guten.php:7
actionactivated_pluginwp-payment.php:15
actioninitwp-payment.php:25
actionadmin_noticeswp-payment.php:272
actionadmin_initwp-payment.php:273
Maintenance & Trust

WP Payment Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedJan 31, 2025
PHP min version
Downloads9K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

WP Payment Developer Profile

WPSuperiors Developer

6 plugins · 260 total installs

86
trust score
Avg Security Score
97/100
Avg Patch Time
54 days
View full developer profile
Detection Fingerprints

How We Detect WP Payment

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-payment/css/style.css/wp-content/plugins/wp-payment/css/tab.css/wp-content/plugins/wp-payment/js/jquery.pay.js/wp-content/plugins/wp-payment/js/form-validation.js
Script Paths
/wp-content/plugins/wp-payment/js/jquery.pay.js/wp-content/plugins/wp-payment/js/form-validation.js
Version Parameters
wp-payment/css/style.css?ver=wp-payment/css/tab.css?ver=wp-payment/js/jquery.pay.js?ver=wp-payment/js/form-validation.js?ver=

HTML / DOM Fingerprints

CSS Classes
form-style-2form-style-2-headinginput-fielderrorMsgtextarea-fieldpaymentselect-field
Data Attributes
id="paymentSubmit"id="your_name"id="email"id="elmNameError"id="elmEmailError"id="choosePayment"+7 more
JS Globals
window.WP_PAY_JS
Shortcode Output
[WP_PAYMENT_FORM]
FAQ

Frequently Asked Questions about WP Payment