WP Pay Per View Divi Security & Risk Analysis

wordpress.org/plugins/wppv-divi

WP Pay Per View is a powerful wordpress plugin that gives WordPress website administrators the ability to offer streaming video immediately to their c …

10 active installs v1.0.15 PHP + WP 3.9+ Updated Mar 6, 2026
divipay-per-viewwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Pay Per View Divi Safe to Use in 2026?

Generally Safe

Score 100/100

WP Pay Per View Divi has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 29d ago
Risk Assessment

The "wppv-divi" plugin v1.0.15 exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code demonstrates good development practices with no dangerous functions, 100% use of prepared statements for SQL queries, and proper output escaping. The lack of file operations, external HTTP requests, nonce checks, and capability checks also suggests a well-contained and secure implementation.

The vulnerability history further reinforces this positive assessment, with zero known CVEs reported for this plugin. This suggests a history of secure development and maintenance, or at least a lack of publicly disclosed vulnerabilities. The absence of any recorded common vulnerability types or recent vulnerabilities indicates a mature and stable security profile. Overall, the plugin appears to be developed with security in mind, presenting minimal risk to a WordPress site.

While the current analysis shows an excellent security record, it's important to note that a complete security audit would involve more in-depth code review and dynamic analysis. However, based on the provided static analysis and historical data, the "wppv-divi" plugin v1.0.15 is considered a low-risk component for a WordPress installation.

Vulnerabilities
None known

WP Pay Per View Divi Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Pay Per View Divi Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped4 total outputs
Attack Surface

WP Pay Per View Divi Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_noticeswp-pay-per-view-divi.php:47
actiondivi_extensions_initwp-pay-per-view-divi.php:50
Maintenance & Trust

WP Pay Per View Divi Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 6, 2026
PHP min version
Downloads2K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

WP Pay Per View Divi Developer Profile

magicplugins

2 plugins · 710 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Pay Per View Divi

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wppv-divi/

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Pay Per View Divi