Pay with PAYUNi Security & Risk Analysis

wordpress.org/plugins/wpbr-payuni-payment

Accept payments via PAYUNi(統一金流) payment for your WooCommerce store.

500 active installs v1.8.1 PHP 7.4+ WP 5.9+ Updated Feb 27, 2026
paymentpayment-gatewaypayunitaiwanwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Pay with PAYUNi Safe to Use in 2026?

Generally Safe

Score 100/100

Pay with PAYUNi has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "wpbr-payuni-payment" plugin version 1.8.1 exhibits a generally strong security posture based on the provided static analysis. It has a limited attack surface with only two AJAX entry points, and importantly, these appear to be protected by nonce checks. The absence of critical or high-severity taint flows, dangerous functions, and raw SQL queries is a significant positive. Furthermore, the plugin has no recorded vulnerability history, which suggests a commitment to security or a lack of past exploitable flaws.

However, there are areas for improvement. The plugin's capability checks are absent, which means that even though nonces are present, any user with access to the front-end could potentially trigger the AJAX actions, assuming these actions themselves don't have internal capability checks. While the majority of output is properly escaped, a percentage of it is not, which could lead to cross-site scripting (XSS) vulnerabilities if the unescaped data is user-controllable or originates from an untrusted source. The external HTTP requests, while not inherently risky without further context, represent a potential avenue for supply chain attacks or information disclosure if the endpoints are compromised or malicious.

In conclusion, "wpbr-payuni-payment" v1.8.1 is relatively secure, with its main strengths being its small attack surface and lack of historical vulnerabilities. The key areas of concern are the missing capability checks on its AJAX handlers and the presence of unescaped output. Addressing these would further harden the plugin against potential attacks.

Key Concerns

  • Missing capability checks on AJAX handlers
  • Unescaped output detected
Vulnerabilities
None known

Pay with PAYUNi Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Pay with PAYUNi Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
22
58 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

73% escaped80 total outputs
Attack Surface

Pay with PAYUNi Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_payuni_querysrc\PayuniPayment.php:134
authwp_ajax_payuni_schedule_cancelsrc\PayuniPayment.php:135
WordPress Hooks 20
filtermanage_shop_order_posts_columnssrc\Admin\OrderList.php:21
actionmanage_shop_order_posts_custom_columnsrc\Admin\OrderList.php:22
actionadd_meta_boxessrc\Admin\OrderMetaBoxes.php:37
actionwoocommerce_api_payuni_paymentsrc\Api\PaymentResponse.php:35
actionwoocommerce_api_payuni_returnsrc\Api\PaymentResponse.php:36
actionwoocommerce_order_details_after_order_tablesrc\Gateways\GatewayBase.php:108
filterwoocommerce_thankyou_order_received_textsrc\Gateways\GatewayBase.php:109
actionafter_setup_themesrc\PayuniPayment.php:122
actionwoocommerce_initsrc\PayuniPayment.php:123
filterwoocommerce_get_settings_pagessrc\PayuniPayment.php:125
filterwoocommerce_payment_gatewayssrc\PayuniPayment.php:127
actionwp_enqueue_scriptssrc\PayuniPayment.php:131
actionadmin_enqueue_scriptssrc\PayuniPayment.php:132
actionpayuni_cancel_expired_ordersrc\PayuniPayment.php:151
actionwpbr_payuni_on_order_status_updatedsrc\PayuniPayment.php:152
actionwoocommerce_order_status_changedsrc\PayuniPayment.php:153
actionadmin_initsrc\Settings\SettingsTab.php:36
actionbefore_woocommerce_initwpbr-payuni-payment.php:46
actionadmin_noticeswpbr-payuni-payment.php:71
actionplugins_loadedwpbr-payuni-payment.php:79
Maintenance & Trust

Pay with PAYUNi Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedFeb 27, 2026
PHP min version7.4
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs500
Developer Profile

Pay with PAYUNi Developer Profile

WPBrewer

2 plugins · 1K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Pay with PAYUNi

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpbr-payuni-payment/assets/css/payuni-checkout.css/wp-content/plugins/wpbr-payuni-payment/assets/js/payuni-checkout.js/wp-content/plugins/wpbr-payuni-payment/assets/js/payuni-admin.js
Script Paths
/wp-content/plugins/wpbr-payuni-payment/assets/js/payuni-checkout.js/wp-content/plugins/wpbr-payuni-payment/assets/js/payuni-admin.js
Version Parameters
wpbr-payuni-payment/assets/css/payuni-checkout.css?ver=wpbr-payuni-payment/assets/js/payuni-checkout.js?ver=wpbr-payuni-payment/assets/js/payuni-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
payuni-payment-formpayuni-payment-method
Data Attributes
data-payuni-checkout
JS Globals
payuni_checkout_params
FAQ

Frequently Asked Questions about Pay with PAYUNi