And The Winner Is… Security & Risk Analysis

wordpress.org/plugins/and-the-winner-is

Manage your product giveaways by marking posts as "contests" and selecting a random comment from a contest post as the winner.

60 active installs v1.1.1 PHP + WP 3.0+ Updated Jul 11, 2011
contestgive-awaygiveawayrandom-commentwinner
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is And The Winner Is… Safe to Use in 2026?

Generally Safe

Score 85/100

And The Winner Is… has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The plugin "and-the-winner-is" v1.1.1 exhibits a mixed security posture, with some good practices offset by significant concerns. On the positive side, the plugin demonstrates a commitment to secure database interactions by exclusively using prepared statements for its SQL queries and lacks any file operations or external HTTP requests, reducing potential attack vectors. Furthermore, it has a clean vulnerability history with no known CVEs, suggesting a generally well-maintained codebase.

However, the plugin presents substantial risks due to its unprotected attack surface. A significant portion of its entry points, specifically 4 out of 5 AJAX handlers, lack any authentication or authorization checks. This creates a clear vulnerability where unauthenticated users could potentially trigger unintended actions or expose sensitive data through these handlers. The static analysis also revealed one taint flow with unsanitized paths, which, although not rated as critical or high, warrants attention as it indicates a potential for improper handling of user-supplied data leading to unexpected behavior or security issues. The low percentage of properly escaped output (26%) is also a concern, increasing the risk of cross-site scripting (XSS) vulnerabilities if user-supplied data is displayed without adequate sanitization.

In conclusion, while the plugin benefits from secure database practices and a lack of historical vulnerabilities, the presence of numerous unprotected AJAX handlers and a notable percentage of unescaped output represent critical security weaknesses. The single identified unsanitized path, even if low severity, further reinforces the need for careful review and remediation of input sanitization and output escaping mechanisms. Users should exercise caution until these vulnerabilities are addressed.

Key Concerns

  • Unprotected AJAX handlers
  • Low percentage of properly escaped output
  • Flow with unsanitized paths
  • No nonce checks on AJAX handlers
Vulnerabilities
None known

And The Winner Is… Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

And The Winner Is… Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
32
11 escaped
Nonce Checks
0
Capability Checks
9
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries

Output Escaping

26% escaped43 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<contests> (admin-pages\contests.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
4 unprotected

And The Winner Is… Attack Surface

Entry Points5
Unprotected4

AJAX Handlers 5

authwp_ajax_atwi_set_commentsatwi.php:27
authwp_ajax_atwi_get_winneratwi.php:28
authwp_ajax_atwi_confirm_winneratwi.php:29
authwp_ajax_atwi_reject_winneratwi.php:30
authwp_ajax_atwi_uninstallatwi.php:31
WordPress Hooks 5
actionadmin_menuatwi.php:21
actionadmin_menuatwi.php:22
actionadmin_initatwi.php:23
actionadmin_enqueue_scriptsatwi.php:24
actionwp_insert_postatwi.php:25
Maintenance & Trust

And The Winner Is… Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedJul 11, 2011
PHP min version
Downloads13K

Community Trust

Rating0/100
Number of ratings0
Active installs60
Developer Profile

And The Winner Is… Developer Profile

spencersokol

2 plugins · 70 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect And The Winner Is…

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/and-the-winner-is/css/atwi-admin.css/wp-content/plugins/and-the-winner-is/js/atwi-admin.js
Script Paths
/wp-content/plugins/and-the-winner-is/js/atwi-admin.js
Version Parameters
and-the-winner-is/css/atwi-admin.css?ver=and-the-winner-is/js/atwi-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
atwi-status
Data Attributes
id="atwi_is_contest"name="atwi_is_contest"id="atwi_number_of_winners"name="atwi_number_of_winners"
JS Globals
atwi_set_commentsatwi_get_winneratwi_confirm_winneratwi_reject_winneratwi_uninstall
REST Endpoints
/wp-json/and-the-winner-is/v1/set-comments/wp-json/and-the-winner-is/v1/get-winner/wp-json/and-the-winner-is/v1/confirm-winner/wp-json/and-the-winner-is/v1/reject-winner/wp-json/and-the-winner-is/v1/uninstall
FAQ

Frequently Asked Questions about And The Winner Is…