Express Payment For Stripe Security & Risk Analysis

wordpress.org/plugins/wp-stripe-express

Shipping with a variety of standalone Stripe payment widgets and woocommerce addon, including options for credit cards, Alipay and WeChat pay, and ACH …

30 active installs v1.28.0 PHP 5.6+ WP 4.9+ Updated Dec 7, 2025
achalipaycredit-cardpaymentstripe
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Express Payment For Stripe Safe to Use in 2026?

Generally Safe

Score 100/100

Express Payment For Stripe has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The wp-stripe-express plugin v1.28.0 exhibits a generally strong security posture based on the provided static analysis. The absence of any recorded vulnerabilities or CVEs in its history is a significant positive indicator. The code appears to follow good practices by largely utilizing prepared statements for SQL queries (77%) and properly escaping most output (81%). Furthermore, the plugin doesn't appear to make external HTTP requests, which reduces the risk of certain types of attacks.

However, there are areas for improvement and potential concern. The lack of capability checks on any entry points (AJAX handlers, REST API routes, shortcodes) is a critical oversight. While the analysis indicates no unauthenticated AJAX handlers or REST API routes, relying solely on unstated implicit authentication for these entry points leaves the door open to privilege escalation if an attacker can bypass those implicit checks or if the authentication mechanism is flawed. The presence of file operations, while not inherently risky, warrants careful review to ensure they are not susceptible to directory traversal or unauthorized file modification. The small number of nonce checks (2) also suggests a potential gap in securing critical actions within the plugin.

In conclusion, while the plugin benefits from a clean vulnerability history and good data handling practices, the absence of explicit capability checks on its entry points presents a notable risk. The limited number of nonce checks further compounds this. Addressing these areas with robust authentication and authorization mechanisms should be a priority to further strengthen its security.

Key Concerns

  • No capability checks on entry points
  • Low number of nonce checks
  • SQL queries not fully prepared
  • Output not fully escaped
  • Bundled libraries potentially outdated
Vulnerabilities
None known

Express Payment For Stripe Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Express Payment For Stripe Release Timeline

v1.28.0Current
v1.27.0
v1.26.6
v1.26.5
v1.26.4
v1.26.3
v1.26.2
v1.26.1
v1.26.0
v1.25.0
v1.24.6
v1.24.2
v1.24.0
v1.20.0
v1.17.0
v1.15.0
v1.14.3
v1.13.0
v1.12.6
v1.12.5
Code Analysis
Analyzed Mar 16, 2026

Express Payment For Stripe Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
10 prepared
Unescaped Output
12
51 escaped
Nonce Checks
2
Capability Checks
0
File Operations
6
External Requests
0
Bundled Libraries
2

Bundled Libraries

Freemius1.0Stripe PHP

SQL Query Safety

77% prepared13 total queries

Output Escaping

81% escaped63 total outputs
Attack Surface

Express Payment For Stripe Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 1

authwp_ajax_stripe_express_dismiss_welcomeincludes\wp-stripe-welcome.php:7

Shortcodes 2

[stripe-express] stripe-express.php:117
[stripe-express-receipt] stripe-express.php:118
WordPress Hooks 13
actionwpcf7_initincludes\addons\wp-stripe-cf7.php:11
actionwpcf7_admin_initincludes\addons\wp-stripe-cf7.php:13
actioninitincludes\wp-stripe-apple-pay-registration.php:9
filterquery_varsincludes\wp-stripe-apple-pay-registration.php:10
actionparse_requestincludes\wp-stripe-apple-pay-registration.php:11
actionadmin_enqueue_scriptsincludes\wp-stripe-welcome.php:5
actionadmin_footerincludes\wp-stripe-welcome.php:6
actionwoocommerce_blocks_loadedstripe-express.php:100
actionplugins_loadedstripe-express.php:103
actionadmin_menustripe-express.php:107
actionadmin_enqueue_scriptsstripe-express.php:108
actionwp_enqueue_scriptsstripe-express.php:109
actionrest_api_initstripe-express.php:113
Maintenance & Trust

Express Payment For Stripe Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 7, 2025
PHP min version5.6
Downloads9K

Community Trust

Rating100/100
Number of ratings3
Active installs30
Developer Profile

Express Payment For Stripe Developer Profile

Payment Addons

5 plugins · 240 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Express Payment For Stripe

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-stripe-express/css/wp-stripe-express-admin.css/wp-content/plugins/wp-stripe-express/css/wp-stripe-express-client.css/wp-content/plugins/wp-stripe-express/js/wp-stripe-express-admin.js/wp-content/plugins/wp-stripe-express/js/wp-stripe-express-client.js
Script Paths
/wp-content/plugins/wp-stripe-express/js/wp-stripe-express-admin.js/wp-content/plugins/wp-stripe-express/js/wp-stripe-express-client.js
Version Parameters
wp-stripe-express/css/wp-stripe-express-admin.css?ver=wp-stripe-express/css/wp-stripe-express-client.css?ver=wp-stripe-express/js/wp-stripe-express-admin.js?ver=wp-stripe-express/js/wp-stripe-express-client.js?ver=

HTML / DOM Fingerprints

CSS Classes
wp_stripe_express_admin
Data Attributes
id="wp_stripe_express_admin"
JS Globals
wp_stripe_setting
REST Endpoints
/wp-json/stripe-express/v1/admin
Shortcode Output
<div>stripe-express: id is required.</div>
FAQ

Frequently Asked Questions about Express Payment For Stripe