Campaign Security & Risk Analysis

wordpress.org/plugins/campaign

Campaign allow user to manage campaign and funding. donate section for each campaign.

10 active installs v1.1 PHP + WP 3.5.1+ Updated Sep 4, 2017
campaign
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Campaign Safe to Use in 2026?

Generally Safe

Score 85/100

Campaign has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "campaign" plugin v1.1 exhibits a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for all SQL queries and avoids file operations and external HTTP requests. The absence of any recorded vulnerabilities in its history is also a strong indicator of past security diligence. However, significant concerns arise from the static analysis. The plugin has a notable attack surface, with two out of three entry points lacking authentication checks. Furthermore, the taint analysis reveals 15 flows with unsanitized paths, including four classified as high severity. This suggests potential for attackers to inject malicious data that could be processed without proper validation, leading to vulnerabilities like Cross-Site Scripting (XSS) or other injection attacks. The complete absence of nonce checks is particularly worrying for the unprotected AJAX handlers, as it opens them up to Cross-Site Request Forgery (CSRF) attacks. While the plugin has no known CVEs, the identified high-severity taint flows represent a significant risk that needs immediate attention.

Key Concerns

  • Unprotected AJAX handlers
  • High severity taint flows
  • Unsanitized paths in taint flows
  • Missing nonce checks
  • Low percentage of properly escaped output
Vulnerabilities
None known

Campaign Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Campaign Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
35
21 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries

Output Escaping

38% escaped56 total outputs
Data Flows
15 unsanitized

Data Flow Analysis

15 flows15 with unsanitized paths
camp_listing (admin\camp_details.php:10)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Campaign Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 2

authwp_ajax_set_livecampaign_plugin.php:155
noprivwp_ajax_set_livecampaign_plugin.php:156

Shortcodes 1

[campaign_funding] camp_shortcode.php:2
WordPress Hooks 6
actionadmin_menuadmin\admin_dasboard_menu.php:2
actionadmin_footeradmin\class-wp-list-table.php:94
actionwp_enqueue_scriptscampaign_plugin.php:42
filtershow_admin_barcampaign_plugin.php:67
actioninitcampaign_plugin.php:72
actioninitcp_post_type.php:2
Maintenance & Trust

Campaign Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedSep 4, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Campaign Developer Profile

Infoway LLC

2 plugins · 20 total installs

76
trust score
Avg Security Score
74/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Campaign

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/campaign/css/camp_css.css/wp-content/plugins/campaign/js/camp_front_end_js.js
Script Paths
/wp-content/plugins/campaign/js/camp_front_end_js.js
Version Parameters
campaign/css/camp_css.css?ver=campaign/js/camp_front_end_js.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-campaign-id
JS Globals
CampAjax
FAQ

Frequently Asked Questions about Campaign