WP PayMobile Content Locker Security & Risk Analysis

wordpress.org/plugins/wp-paymobile-content-locker

WP PayMobile is a new monetization method for your website. Get payments by SMS / Phone Call for revealing content.

10 active installs v1.3 PHP + WP 3.0+ Updated Jul 9, 2015
content-lockermicropaymentspay-by-smspaymobilesms-gateway
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP PayMobile Content Locker Safe to Use in 2026?

Generally Safe

Score 85/100

WP PayMobile Content Locker has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The wp-paymobile-content-locker v1.3 plugin exhibits several concerning security practices despite having no recorded historical vulnerabilities. The static analysis reveals a critical lack of input sanitization and capability checks, particularly highlighted by two high-severity taint flows with unsanitized paths. Furthermore, the absence of nonce checks on any entry points (even though none are explicitly marked as unprotected in the 'attack surface' section, the general lack of checks is worrying) and the low percentage of properly escaped output (18%) create significant opportunities for cross-site scripting (XSS) and other injection attacks. While the plugin doesn't utilize dangerous functions or make external HTTP requests, and its SQL queries show some use of prepared statements, these strengths are overshadowed by the fundamental weaknesses in handling user input and enforcing permissions. The lack of vulnerability history is positive but can also be misleading if not accompanied by robust security practices, which are clearly lacking here.

Key Concerns

  • High severity taint flows with unsanitized paths
  • No nonce checks implemented
  • Low percentage of properly escaped output
  • No capability checks implemented
  • Some SQL queries not using prepared statements
Vulnerabilities
None known

WP PayMobile Content Locker Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP PayMobile Content Locker Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
4 prepared
Unescaped Output
9
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

SQL Query Safety

57% prepared7 total queries

Output Escaping

18% escaped11 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
options_page (WP-PayMobile.php:223)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP PayMobile Content Locker Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[wp_paymobile_popup] WP-PayMobile.php:26
[wp_paymobile_ipn] WP-PayMobile.php:27
WordPress Hooks 4
actionadmin_menuWP-PayMobile.php:33
filterwp_nav_menu_argsWP-PayMobile.php:36
filterwp_page_menu_argsWP-PayMobile.php:37
filterwp_list_pages_excludesWP-PayMobile.php:38
Maintenance & Trust

WP PayMobile Content Locker Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedJul 9, 2015
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings5
Active installs10
Developer Profile

WP PayMobile Content Locker Developer Profile

crivion

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP PayMobile Content Locker

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-paymobile-content-locker/lock.png

HTML / DOM Fingerprints

CSS Classes
paygol
HTML Comments
<!-- PayGol JavaScript --><!-- PayGol Form -->
Data Attributes
name="pg_frm"action="https://www.paygol.com/pay"name="pg_serviceid"name="pg_currency"name="pg_name"name="pg_custom"+4 more
Shortcode Output
[wp_paymobile_popup][wp_paymobile_ipn]
FAQ

Frequently Asked Questions about WP PayMobile Content Locker