WP Stripe Security & Risk Analysis

wordpress.org/plugins/wp-stripe

WP Stripe provides a payment form and recent donor widget by utilizing Stripe.com, the awesome alternative to PayPal.

100 active installs v1.5 PHP + WP 3.1+ Updated Apr 23, 2014
paypaymentpaypalstripetransfer
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Stripe Safe to Use in 2026?

Generally Safe

Score 85/100

WP Stripe has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The wp-stripe v1.5 plugin exhibits a generally strong security posture based on the provided static analysis and vulnerability history. It effectively utilizes prepared statements for SQL queries and demonstrates a high rate of output escaping, which are crucial for preventing common web vulnerabilities. The absence of any recorded CVEs, along with no critical or high severity taint flows, further suggests a well-developed and secure codebase.

However, there are a few areas that warrant attention. The plugin has two AJAX handlers, and while one has a nonce check, the other does not, presenting a potential weakness if that handler can be triggered by unauthenticated users. Furthermore, there are no explicit capability checks on any entry points. While the analysis indicates zero unprotected entry points, the lack of capability checks means that even if an entry point requires authentication, there's no granular control over *who* can access it, potentially allowing any logged-in user to perform actions they shouldn't.

In conclusion, wp-stripe v1.5 is largely secure, with a commendable history of no vulnerabilities. The primary concerns stem from the potential for unauthenticated actions via the unprotected AJAX handler and the absence of role-based access control (capability checks). Addressing these two areas would significantly enhance the plugin's overall security.

Key Concerns

  • AJAX handler without nonce check
  • Missing capability checks on entry points
  • External HTTP request with potential risks
  • Output escaping not fully comprehensive
Vulnerabilities
None known

WP Stripe Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Stripe Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
30
113 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
1

Bundled Libraries

Stripe PHP

Output Escaping

79% escaped143 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
wp_stripe_charge_initiate (includes\stripe-functions.php:95)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Stripe Attack Surface

Entry Points4
Unprotected0

AJAX Handlers 2

authwp_ajax_wp_stripe_charge_initiateincludes\stripe-functions.php:201
noprivwp_ajax_wp_stripe_charge_initiateincludes\stripe-functions.php:202

Shortcodes 2

[wp-stripe] includes\stripe-functions.php:33
[wp-legacy-stripe] includes\stripe-functions.php:47
WordPress Hooks 14
actioninitincludes\stripe-cpt.php:18
actionadmin_initincludes\stripe-options.php:421
actioninitincludes\stripe-rewrite.php:9
filterquery_varsincludes\stripe-rewrite.php:15
actiontemplate_redirectincludes\stripe-rewrite.php:25
actionwidgets_initincludes\stripe-widget-recent.php:171
actionadmin_initwp-stripe.php:91
actionadmin_menuwp-stripe.php:92
actionwp_print_scriptswp-stripe.php:107
actionadmin_print_scriptswp-stripe.php:113
actionwp_print_styleswp-stripe.php:125
actionadmin_print_styleswp-stripe.php:130
actionwp_print_styleswp-stripe.php:139
actionwp_footerwp-stripe.php:152
Maintenance & Trust

WP Stripe Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedApr 23, 2014
PHP min version
Downloads25K

Community Trust

Rating68/100
Number of ratings14
Active installs100
Developer Profile

WP Stripe Developer Profile

Noel Tock

3 plugins · 340 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Stripe

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-stripe/css/wp-stripe-display.css/wp-content/plugins/wp-stripe/css/wp-stripe-widget.css/wp-content/plugins/wp-stripe/css/wp-stripe-admin.css/wp-content/plugins/wp-stripe/css/wp-stripe-thickbox.css/wp-content/plugins/wp-stripe/js/wp-stripe.js
Script Paths
https://js.stripe.com/v1/
Version Parameters
wp-stripe-jsstripe-js

HTML / DOM Fingerprints

CSS Classes
wp-stripe-typeswp-stripe-modal-button
HTML Comments
<!-- Next, we'll need to show the user what cards they can use -->
Data Attributes
id="wp-stripe-types"id="wp-stripe-modal-button"title="
JS Globals
wpstripekeyajaxurltb_pathToImagetb_closeImage
Shortcode Output
<a class="thickbox" id="wp-stripe-modal-button" title="
FAQ

Frequently Asked Questions about WP Stripe