WPAdmin Stripe Payment & Donation Security & Risk Analysis

wordpress.org/plugins/wpadmin-stripe-payment-gateway

Setting up Stripe Payment can’t get any simple. Collect payments / donations right from your WordPress Site. Supports one-time and recurring payments …

10 active installs v2.6.1 PHP 7.0+ WP 4.4.2+ Updated Nov 16, 2022
donationfreepayment-gatewaystripe-paymentsubscription
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPAdmin Stripe Payment & Donation Safe to Use in 2026?

Generally Safe

Score 85/100

WPAdmin Stripe Payment & Donation has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The plugin "wpadmin-stripe-payment-gateway" version 2.6.1 presents a mixed security posture. On the positive side, it has no recorded vulnerabilities or CVEs, and the code demonstrates good practices in its use of prepared statements for SQL queries and proper output escaping. The absence of external HTTP requests and bundled libraries also reduces potential attack vectors.

However, significant security concerns arise from the static analysis. The plugin exposes a substantial attack surface through its entry points, with a high proportion of AJAX handlers lacking any authentication checks. This means any user, potentially even unauthenticated ones, could interact with these critical functions. Furthermore, the taint analysis revealed a flow with unsanitized paths, which, while not classified as critical or high severity in this instance, still represents a potential avenue for exploiting path traversal or similar vulnerabilities if exploited in conjunction with other weaknesses.

The lack of nonce checks and capability checks on AJAX handlers is a particularly worrying oversight. Coupled with the unsanitized path flow, this plugin has several fundamental security weaknesses that could be exploited, despite its clean vulnerability history. While the absence of past vulnerabilities is encouraging, it doesn't negate the immediate risks identified in the current codebase. A balanced conclusion would highlight the developer's attention to SQL and output sanitization, but strongly caution against the significant unauthenticated entry points and the identified unsanitized path flow.

Key Concerns

  • 4 unprotected AJAX handlers
  • Unsanitized path flow found in taint analysis
  • 0 Nonce checks on AJAX handlers
  • 0 Capability checks
  • 33% of SQL queries not using prepared statements
  • 11% of outputs not properly escaped
Vulnerabilities
None known

WPAdmin Stripe Payment & Donation Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WPAdmin Stripe Payment & Donation Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
4 prepared
Unescaped Output
15
122 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

67% prepared6 total queries

Output Escaping

89% escaped137 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<wpadmin-stripe-shortcode> (admin\wpadmin-stripe-shortcode.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
4 unprotected

WPAdmin Stripe Payment & Donation Attack Surface

Entry Points5
Unprotected4

AJAX Handlers 4

noprivwp_ajax_wpastripe_intentclass-wpadmin-stripe.php:509
authwp_ajax_wpastripe_intentclass-wpadmin-stripe.php:510
noprivwp_ajax_wpastripe_save2dbclass-wpadmin-stripe.php:511
authwp_ajax_wpastripe_save2dbclass-wpadmin-stripe.php:512

Shortcodes 1

[wpa_stripe] class-wpadmin-stripe.php:68
WordPress Hooks 5
actionadmin_menuadmin\class-wpadmin-stripe-admin.php:39
actionwp_headclass-wpadmin-stripe.php:22
actionwp_footerclass-wpadmin-stripe.php:34
actionadmin_enqueue_scriptsclass-wpadmin-stripe.php:48
actionwp_enqueue_scriptsclass-wpadmin-stripe.php:61
Maintenance & Trust

WPAdmin Stripe Payment & Donation Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedNov 16, 2022
PHP min version7.0
Downloads9K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WPAdmin Stripe Payment & Donation Developer Profile

luckychingi

3 plugins · 520 total installs

72
trust score
Avg Security Score
90/100
Avg Patch Time
196 days
View full developer profile
Detection Fingerprints

How We Detect WPAdmin Stripe Payment & Donation

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpadmin-stripe-payment-gateway/assets/js/script.js/wp-content/plugins/wpadmin-stripe-payment-gateway/assets/css/style.css
Script Paths
https://js.stripe.com/v3/
Version Parameters
wpadmin-stripe-payment-gateway/assets/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpastripe_formwpastripe_forminput_wrapperwpastripe_fnamewpastripe_emailwpastripe_phonewpastripe_optwpastripe_amtwpastripe_onethird+6 more
HTML Comments
Stripe Plugin. Powered by WPAdmin.ca 2.6.1
Data Attributes
id="wpa_stripe_nameid="wpa_stripe_emailid="wpa_stripe_contactid="wpa_stripe_optdata-id="id="wpa_stripe_amount+6 more
JS Globals
var stripe = Stripe('var ajaxurl = "
Shortcode Output
<form method=POST name=stripeclass='wpastripe_form'><h2>[Testing]
FAQ

Frequently Asked Questions about WPAdmin Stripe Payment & Donation