Yampi Checkout Security & Risk Analysis

wordpress.org/plugins/yampi-checkout

Aumente a sua conversão com o Checkout da Yampi. Recursos poderosos que irão elevar seu negócio para outro nível.

1K active installs v1.0.5 PHP + WP 3.8.0+ Updated Jun 10, 2024
checkoutcheckout-transparentedropshipping-checkoutonepage-checkoutyampi
92
A · Safe
CVEs total1
Unpatched0
Last CVEJun 13, 2022
Safety Verdict

Is Yampi Checkout Safe to Use in 2026?

Generally Safe

Score 92/100

Yampi Checkout has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Jun 13, 2022Updated 1yr ago
Risk Assessment

The "yampi-checkout" plugin v1.0.5 presents a mixed security posture. On the positive side, the plugin demonstrates good practices in several areas. All SQL queries are properly prepared, significantly mitigating SQL injection risks. There are no dangerous function calls, file operations, or external HTTP requests, which reduces the potential for a wider range of attacks. The absence of bundled libraries also means no risks from outdated third-party code.

However, significant concerns arise from the static analysis. The plugin has one REST API route exposed without any permission callback. This creates a direct entry point for unauthenticated access, posing a substantial risk. The lack of nonce checks on AJAX handlers is also a notable weakness, potentially allowing for Cross-Site Request Forgery (CSRF) attacks if any AJAX actions are performed. While taint analysis showed no critical or high-severity vulnerabilities, the presence of unsanitized input flows, even if not deemed critical in this analysis, warrants caution.

The vulnerability history reveals one past medium-severity Cross-Site Scripting (XSS) vulnerability, last patched in June 2022. While there are no currently unpatched vulnerabilities, this history indicates a propensity for XSS issues, which can be serious if not addressed properly. The combination of an unprotected REST API endpoint and the historical XSS vulnerability suggests that the plugin might not have robust input validation and authorization mechanisms. In conclusion, while some core security practices are followed, the unprotected REST API endpoint and the historical XSS vulnerability are critical weaknesses that need immediate attention.

Key Concerns

  • Unprotected REST API route
  • Missing nonce checks on AJAX
  • Past Medium XSS vulnerability
  • Unescaped output
Vulnerabilities
1 published

Yampi Checkout Security Vulnerabilities

CVEs by Year

1 CVE in 2022
2022
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

WF-a93f6dce-56e0-4131-ba26-65a0c6b2e9c5-yampi-checkoutmedium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Yampi Checkout < = 1.0.3 - Reflected Cross-Site Scripting

Jun 13, 2022 Patched in 1.0.4 (589d)
Version History

Yampi Checkout Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Yampi Checkout Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

75% escaped4 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
script (yampi-wc.php:87)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Yampi Checkout Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

GET/wp-json/yampi-checkout/v1/ordersyampi-wc.php:34
WordPress Hooks 5
actionwoocommerce_before_cartyampi-wc.php:22
actionwoocommerce_before_checkout_formyampi-wc.php:23
actionrest_api_inityampi-wc.php:24
actioninityampi-wc.php:25
actionplugins_loadedyampi-wc.php:147
Maintenance & Trust

Yampi Checkout Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedJun 10, 2024
PHP min version
Downloads23K

Community Trust

Rating50/100
Number of ratings4
Active installs1K
Developer Profile

Yampi Checkout Developer Profile

lucascolette

1 plugin · 1K total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
589 days
View full developer profile
Detection Fingerprints

How We Detect Yampi Checkout

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/yampi-checkout/style.css

HTML / DOM Fingerprints

CSS Classes
yampi-loaderyampi-loading
JS Globals
window.Yampi
REST Endpoints
/wp-json/yampi-checkout/v1/orders
FAQ

Frequently Asked Questions about Yampi Checkout