XpressPay Payment Gateway Security & Risk Analysis

wordpress.org/plugins/xpresspay-payment-gateway

XpressPay Payment Gateway allows you to accept online payments on your Woocommerce store via Visa Cards, Mastercards, Verve Cards, Bank Transfer, USSD …

0 active installs v1.0.0 PHP 5.6+ WP 4.7+ Updated Feb 14, 2022
payment-gatewayverve-cardswoocommercexpresspayxpresspay-plugins
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is XpressPay Payment Gateway Safe to Use in 2026?

Generally Safe

Score 85/100

XpressPay Payment Gateway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The static analysis of xpresspay-payment-gateway v1.0.0 reveals an exceptionally clean codebase with no identified vulnerabilities in attack surface, dangerous functions, or file operations. The plugin demonstrates strong security practices by exclusively using prepared statements for all SQL queries and having a high rate of output escaping. This suggests a conscious effort to prevent common vulnerabilities like SQL injection and XSS.

However, a significant concern is the complete absence of nonce checks and capability checks. This indicates that no measures are in place to verify user authentication or authorization for any potential backend operations, should they exist but not be exposed through obvious entry points in the static analysis. The presence of two external HTTP requests without any disclosed context also presents a potential risk, as these could be vectors for various attacks if not handled securely.

The plugin's vulnerability history is entirely clean, with no recorded CVEs. This is a positive indicator, suggesting the developers have a good track record or that the plugin has not been extensively targeted or analyzed in the past. While the lack of past vulnerabilities is reassuring, it doesn't negate the identified weaknesses in the current version's architecture, particularly regarding the lack of authorization and nonce checks.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • External HTTP requests without context
  • Minor unescaped output (1/9)
Vulnerabilities
None known

XpressPay Payment Gateway Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

XpressPay Payment Gateway Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

89% escaped9 total outputs
Attack Surface

XpressPay Payment Gateway Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedxpress-pay.php:17
actionadmin_noticesxpress-pay.php:80
actionwoocommerce_api_wc_gateway_xpress_payxpress-pay.php:83
filterwoocommerce_currenciesxpress-pay.php:86
filterwoocommerce_currency_symbolxpress-pay.php:90
filterwoocommerce_payment_gatewaysxpress-pay.php:365
Maintenance & Trust

XpressPay Payment Gateway Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedFeb 14, 2022
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

XpressPay Payment Gateway Developer Profile

Сервис "Экспресс Платежи"

4 plugins · 90 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect XpressPay Payment Gateway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/xpresspay-payment-gateway/assets/images/xpresspay-payment-options.png/wp-content/plugins/xpresspay-payment-gateway/assets/images/xpresslogo.png

HTML / DOM Fingerprints

REST Endpoints
/wp-json/xpresspay/v1/payment
FAQ

Frequently Asked Questions about XpressPay Payment Gateway