YengaPay Security & Risk Analysis

wordpress.org/plugins/yengapay

Integrate YengaPay payment gateway with WooCommerce for mobile money payments in West Africa.

20 active installs v1.0.0 PHP 7.2+ WP 5.0+ Updated Feb 3, 2025
mobile-moneypayment-gatewaywest-africawoocommerceyengapay
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is YengaPay Safe to Use in 2026?

Generally Safe

Score 92/100

YengaPay has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The Yengapay v1.0.0 plugin exhibits a generally positive security posture based on the static analysis. It demonstrates good practices by not utilizing dangerous functions, employing prepared statements for all SQL queries, and properly escaping all output. The absence of identified taint flows also indicates a lack of detectable vulnerabilities related to data sanitization. The plugin also has no recorded vulnerability history, which is a strong indicator of secure development over time.

However, there are notable areas for concern. The complete absence of nonce checks and capability checks is a significant security weakness. This means that any functionality exposed, even if not directly through a large attack surface, is vulnerable to unauthorized execution if an attacker can trigger it. The presence of a file operation and an external HTTP request, while not inherently insecure, warrants further scrutiny to ensure these actions are appropriately secured and validated.

In conclusion, Yengapay v1.0.0 scores well on many fundamental security aspects like SQL injection prevention and output escaping. The lack of historical vulnerabilities is a testament to its developer's attention to security. Nevertheless, the critical oversight in implementing authorization checks (nonces and capabilities) presents a substantial risk that needs to be addressed to achieve a truly secure plugin.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • File operation without explicit auth check context
  • External HTTP request without explicit auth check context
Vulnerabilities
None known

YengaPay Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

YengaPay Release Timeline

v1.0.1
v1.0.0Current
Code Analysis
Analyzed Mar 17, 2026

YengaPay Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

YengaPay Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionplugins_loadedyengapay.php:23
filterwoocommerce_payment_gatewaysyengapay.php:24
filterwoocommerce_currenciesyengapay.php:25
filterwoocommerce_currency_symbolyengapay.php:26
Maintenance & Trust

YengaPay Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedFeb 3, 2025
PHP min version7.2
Downloads633

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

YengaPay Developer Profile

Kreezus

1 plugin · 20 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect YengaPay

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/yengapay/includes/class-wc-yengapay-gateway.php/wp-content/plugins/yengapay/includes/class-yengapay-currency-converter.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about YengaPay