
Yampi Checkout Security & Risk Analysis
wordpress.org/plugins/yampi-checkoutAumente a sua conversão com o Checkout da Yampi. Recursos poderosos que irão elevar seu negócio para outro nível.
Is Yampi Checkout Safe to Use in 2026?
Generally Safe
Score 92/100Yampi Checkout has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.
The "yampi-checkout" plugin v1.0.5 presents a mixed security posture. On the positive side, the plugin demonstrates good practices in several areas. All SQL queries are properly prepared, significantly mitigating SQL injection risks. There are no dangerous function calls, file operations, or external HTTP requests, which reduces the potential for a wider range of attacks. The absence of bundled libraries also means no risks from outdated third-party code.
However, significant concerns arise from the static analysis. The plugin has one REST API route exposed without any permission callback. This creates a direct entry point for unauthenticated access, posing a substantial risk. The lack of nonce checks on AJAX handlers is also a notable weakness, potentially allowing for Cross-Site Request Forgery (CSRF) attacks if any AJAX actions are performed. While taint analysis showed no critical or high-severity vulnerabilities, the presence of unsanitized input flows, even if not deemed critical in this analysis, warrants caution.
The vulnerability history reveals one past medium-severity Cross-Site Scripting (XSS) vulnerability, last patched in June 2022. While there are no currently unpatched vulnerabilities, this history indicates a propensity for XSS issues, which can be serious if not addressed properly. The combination of an unprotected REST API endpoint and the historical XSS vulnerability suggests that the plugin might not have robust input validation and authorization mechanisms. In conclusion, while some core security practices are followed, the unprotected REST API endpoint and the historical XSS vulnerability are critical weaknesses that need immediate attention.
Key Concerns
- Unprotected REST API route
- Missing nonce checks on AJAX
- Past Medium XSS vulnerability
- Unescaped output
Yampi Checkout Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Yampi Checkout < = 1.0.3 - Reflected Cross-Site Scripting
Yampi Checkout Release Timeline
Yampi Checkout Code Analysis
Output Escaping
Data Flow Analysis
Yampi Checkout Attack Surface
REST API Routes 1
WordPress Hooks 5
Maintenance & Trust
Yampi Checkout Maintenance & Trust
Maintenance Signals
Community Trust
Yampi Checkout Alternatives
Zouti Checkout
zouti
A plataforma completa de vendas para o seu e-commerce.
PayPal Brasil para WooCommerce
paypal-brasil-para-woocommerce
Easily add PayPal payment options to your WooCommerce store.
Quick Orders | Easy Product & Order System Management for F-Commerce
quick-orders
A lightweight solution for F-Commerce businesses to manage products and orders with Elementor integration - no WooCommerce required.
Checkout Field Editor (Checkout Manager) for WooCommerce
woo-checkout-field-editor-pro
Checkout Field Editor (Checkout Manager) for WooCommerce – The best WooCommerce checkout manager plugin to manage WooCommerce checkout fields.
Checkout Field Manager (Checkout Manager) for WooCommerce
woocommerce-checkout-manager
Checkout Field Manager (Checkout Manager) for WooCommerce is the most advanced plugin to customize checkout fields on your WooCommerce checkout page.
Yampi Checkout Developer Profile
1 plugin · 1K total installs
How We Detect Yampi Checkout
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/yampi-checkout/style.cssHTML / DOM Fingerprints
yampi-loaderyampi-loadingwindow.Yampi/wp-json/yampi-checkout/v1/orders