
WP Payment Security & Risk Analysis
wordpress.org/plugins/wp-paymentGet recurring and onetime payments with PayPal, Authorize.NET and Stripe.
Is WP Payment Safe to Use in 2026?
Generally Safe
Score 92/100WP Payment has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wp-payment" v2.3.0 plugin exhibits a mixed security posture. On the positive side, the plugin has a very small attack surface, with only one shortcode and no AJAX handlers, REST API routes, or cron events that are exposed externally. Furthermore, all SQL queries are properly prepared, indicating a good understanding of database security practices. The absence of known CVEs and a clean vulnerability history suggests that the plugin has generally been developed with security in mind. However, significant concerns arise from the code analysis. The output escaping is alarmingly low at 49%, meaning nearly half of all outputs are potentially vulnerable to cross-site scripting (XSS) attacks. Compounding this is the complete lack of nonce checks and capability checks, leaving even the single entry point (the shortcode) and any potential internal functions exposed to unauthorized actions and privilege escalation. The presence of file operations and external HTTP requests, while not inherently risky, requires careful scrutiny in conjunction with the other identified weaknesses.
While the plugin's small attack surface and SQL hygiene are commendable strengths, the pervasive issues with output escaping and the complete absence of nonce and capability checks represent critical vulnerabilities. These omissions significantly increase the risk of XSS attacks and unauthorized operations. The plugin's clean vulnerability history is a positive sign, but it does not mitigate the immediate risks identified in the current static analysis. A balanced conclusion is that this plugin, despite its clean history, requires urgent attention to address the critical output escaping and authorization bypass vulnerabilities before it can be considered secure.
Key Concerns
- Low output escaping percentage
- Missing nonce checks
- Missing capability checks
WP Payment Security Vulnerabilities
WP Payment Code Analysis
Output Escaping
WP Payment Attack Surface
Shortcodes 1
WordPress Hooks 15
Maintenance & Trust
WP Payment Maintenance & Trust
Maintenance Signals
Community Trust
WP Payment Alternatives
Stripe Payment Forms by WP Full Pay – Accept Credit Card Payments, Donations & Subscriptions
wp-full-stripe-free
🚀 Create Stripe payment forms for WordPress. Accept credit cards, Apple Pay, donations, subscriptions & more. Easy setup, no coding needed!
Stripe Payment Forms by WP Simple Pay – Accept Credit Card Payments + Subscriptions with Stripe
stripe
🤩 Accept Stripe payments and recurring subscriptions on your WordPress using WP Simple Pay, the best Stripe payments plugin! 🚀
Kali Forms — Contact Form & Drag-and-Drop Builder
kali-forms
Build contact forms for your WordPress website in minutes through the Drag & Drop builder and Guided Emails for entries notifications.
Accept Stripe Payments
stripe-payments
Easily accept payments on your WordPress site via Stripe payment gateway.
Payment Gateway of Stripe for WooCommerce
payment-gateway-stripe-and-woocommerce-integration
Integrate Stripe Payment Gateway in WooCommerce and accept cards, Google Pay, Apple Pay, Klarna, Alipay, and more with seamless, secure checkout.
WP Payment Developer Profile
6 plugins · 260 total installs
How We Detect WP Payment
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-payment/css/style.css/wp-content/plugins/wp-payment/css/tab.css/wp-content/plugins/wp-payment/js/jquery.pay.js/wp-content/plugins/wp-payment/js/form-validation.js/wp-content/plugins/wp-payment/js/jquery.pay.js/wp-content/plugins/wp-payment/js/form-validation.jswp-payment/css/style.css?ver=wp-payment/css/tab.css?ver=wp-payment/js/jquery.pay.js?ver=wp-payment/js/form-validation.js?ver=HTML / DOM Fingerprints
form-style-2form-style-2-headinginput-fielderrorMsgtextarea-fieldpaymentselect-fieldid="paymentSubmit"id="your_name"id="email"id="elmNameError"id="elmEmailError"id="choosePayment"+7 morewindow.WP_PAY_JS[WP_PAYMENT_FORM]