Campwire Security & Risk Analysis

wordpress.org/plugins/campwire

The plugin submits Campwire customer name and email to ActiveCampaign list from purchase Thank You page.

0 active installs v0.0.2 PHP 5.2.0+ WP 4.7.0+ Updated Sep 24, 2021
activecampaigncampwireintegration
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Campwire Safe to Use in 2026?

Generally Safe

Score 85/100

Campwire has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "campwire" v0.0.2 plugin exhibits a generally good security posture based on the provided static analysis. The absence of identified dangerous functions, raw SQL queries, and file operations are positive indicators. Furthermore, the plugin demonstrates good practices by implementing nonce checks and capability checks for its entry points, and all SQL queries utilize prepared statements, which significantly mitigates SQL injection risks. The low attack surface, with only one shortcode and no unprotected AJAX handlers or REST API routes, further contributes to its strong security profile.

However, a notable concern arises from the output escaping, where only 61% of outputs are properly escaped. This leaves a potential window for cross-site scripting (XSS) vulnerabilities, particularly if the unescaped outputs handle user-supplied data. The presence of external HTTP requests, while not inherently a vulnerability, warrants careful scrutiny in a real-world scenario to ensure the target is trustworthy and the request is properly secured and validated. The plugin's vulnerability history is clean, with no recorded CVEs, which is a very positive sign and suggests a history of secure development practices.

In conclusion, "campwire" v0.0.2 presents a promising security profile, largely due to its adherence to core WordPress security best practices like prepared statements and nonce/capability checks. The main area requiring attention is the incomplete output escaping, which could be a source of XSS. The lack of historical vulnerabilities is a significant strength, but the minor weaknesses identified in the static analysis should not be overlooked.

Key Concerns

  • Incomplete output escaping
Vulnerabilities
None known

Campwire Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Campwire Release Timeline

v0.0.2Current
v0.0.1
Code Analysis
Analyzed Apr 16, 2026

Campwire Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
11 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

61% escaped18 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
gritonl_cwac_plugin_options (admin/cwac_admin.php:30)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Campwire Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[gritonl_cwac] cwacintegration.php:41
WordPress Hooks 2
actionadmin_menuadmin/cwac_admin.php:21
actionwp_headcwacintegration.php:53
Maintenance & Trust

Campwire Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedSep 24, 2021
PHP min version5.2.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Campwire Developer Profile

Ilari Arovuo

3 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Campwire

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- ================================================= --><!-- Allow code only if WordPress is loaded --><!-- ================================================= --><!-- ================================================= -->+29 more
FAQ

Frequently Asked Questions about Campwire