Zoho Billing – Embed Payment Form Security & Risk Analysis

wordpress.org/plugins/zoho-subscriptions

Embed payment forms on your WordPress pages/posts without any coding.

500 active installs v4.1 PHP + WP + Updated Nov 30, 2025
checkout-formsone-time-paymentsonline-paymentspci-complaintrecurring-payments
77
B · Generally Safe
CVEs total2
Unpatched1
Last CVESep 22, 2025
Safety Verdict

Is Zoho Billing – Embed Payment Form Safe to Use in 2026?

Mostly Safe

Score 77/100

Zoho Billing – Embed Payment Form is generally safe to use. 2 past CVEs were resolved. Keep it updated.

2 known CVEs 1 unpatched Last CVE: Sep 22, 2025Updated 4mo ago
Risk Assessment

The zoho-subscriptions plugin version 4.1 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices regarding SQL queries, exclusively using prepared statements, and has a low number of entry points with zero identified as unprotected. The static analysis also shows a good rate of output escaping and the presence of a nonce check. However, the complete absence of capability checks is a significant concern, suggesting that access control might be improperly implemented, potentially leaving features vulnerable to unauthorized use. Additionally, the plugin has a history of two known CVEs, one of which remains unpatched. Both historical vulnerabilities were classified as medium severity and related to Cross-site Scripting, indicating a recurring pattern of input sanitization issues.

Key Concerns

  • Unpatched CVE
  • No capability checks
  • Medium severity vulnerabilities in history
  • Low percentage of properly escaped output
Vulnerabilities
2

Zoho Billing – Embed Payment Form Security Vulnerabilities

CVEs by Year

2 CVEs in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2025-57963medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Zoho Billing <= 4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting

Sep 22, 2025Unpatched
CVE-2025-30900medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Zoho Billing – Embed Payment Form <= 4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting

Mar 27, 2025 Patched in 4.1 (8d)
Code Analysis
Analyzed Mar 16, 2026

Zoho Billing – Embed Payment Form Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
28 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

88% escaped32 total outputs
Attack Surface

Zoho Billing – Embed Payment Form Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[zoho_checkout] zoho-subscriptions.php:257
[zs] zoho-subscriptions.php:258
WordPress Hooks 4
actionadmin_initzoho-subscriptions.php:253
actionadmin_menuzoho-subscriptions.php:254
actionadmin_enqueue_scriptszoho-subscriptions.php:255
actionadmin_post_zs_form_submissionzoho-subscriptions.php:259
Maintenance & Trust

Zoho Billing – Embed Payment Form Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedNov 30, 2025
PHP min version
Downloads15K

Community Trust

Rating40/100
Number of ratings4
Active installs500
Developer Profile

Zoho Billing – Embed Payment Form Developer Profile

Zoho Subscriptions

1 plugin · 500 total installs

78
trust score
Avg Security Score
77/100
Avg Patch Time
8 days
View full developer profile
Detection Fingerprints

How We Detect Zoho Billing – Embed Payment Form

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/zoho-subscriptions/assets/css/zoho-subscriptions.css

HTML / DOM Fingerprints

CSS Classes
zswelcomepanouterzswelcomepanzswelheadingzslinkzssmallink
Data Attributes
data-plugin-name="zoho-subscriptions"data-plugin-version="4.1"
JS Globals
showErrorMessagezs_api_key
FAQ

Frequently Asked Questions about Zoho Billing – Embed Payment Form