TIPI Security & Risk Analysis

wordpress.org/plugins/wp-tipi

Tipi for Wordpress is a plugin allowing city hall and collectivities to integrate the TIPI payment gateway into their website, simply and efficiently

30 active installs v1.1.7.1 PHP + WP 4.4+ Updated Aug 24, 2017
city-hallcredit-carde-commerceecommercemairie
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is TIPI Safe to Use in 2026?

Generally Safe

Score 85/100

TIPI has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "wp-tipi" v1.1.7.1 plugin exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The complete absence of identified AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points is a significant positive, indicating a minimal attack surface. Furthermore, the use of prepared statements for all SQL queries and the presence of nonce checks are excellent security practices. The lack of detected dangerous functions, file operations, and external HTTP requests further contribute to its secure design.

However, a significant concern arises from the output escaping. With 29 total outputs and only 10% properly escaped, there is a high probability of Cross-Site Scripting (XSS) vulnerabilities. This is the most prominent risk identified in the code analysis. The plugin's vulnerability history shows no prior CVEs, which is a positive indicator of past security awareness and diligence, but it does not mitigate the current risk of unescaped output.

In conclusion, while the plugin has a robust foundation regarding entry points and data handling, the poor output escaping practices present a tangible and significant risk. Addressing the unescaped output is paramount to improving the overall security of this plugin.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

TIPI Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

TIPI Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
26
3 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

10% escaped29 total outputs
Attack Surface

TIPI Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionplugins_loadedincludes\class-tipi.php:144
actionadmin_enqueue_scriptsincludes\class-tipi.php:159
actionadmin_enqueue_scriptsincludes\class-tipi.php:160
actionadmin_menuincludes\class-tipi.php:161
actionadmin_initincludes\class-tipi.php:162
actioninitincludes\class-tipi.php:163
actioninitincludes\class-tipi.php:164
actionadd_meta_boxesincludes\class-tipi.php:165
actionsave_postincludes\class-tipi.php:166
actionplugin_row_metaincludes\class-tipi.php:167
actionwp_enqueue_scriptsincludes\class-tipi.php:181
actionwp_enqueue_scriptsincludes\class-tipi.php:182
filterthe_contentincludes\class-tipi.php:183
Maintenance & Trust

TIPI Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedAug 24, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

TIPI Developer Profile

Hasan Shahriar

6 plugins · 1K total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
144 days
View full developer profile
Detection Fingerprints

How We Detect TIPI

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-tipi/admin/css/tipi-admin.css/wp-content/plugins/wp-tipi/admin/js/tipi-admin.js
Script Paths
/wp-content/plugins/wp-tipi/admin/js/tipi-admin.js
Version Parameters
wp-tipi/admin/css/tipi-admin.css?ver=wp-tipi/admin/js/tipi-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
tipi-gateway-settings-admin
FAQ

Frequently Asked Questions about TIPI