Donate Me Security & Risk Analysis

wordpress.org/plugins/donate-me

Adds PayPal Donation with Donate Me. Simple. Easy. Multiple button and colors.

20 active installs v1.2.5 PHP + WP 2.7.0+ Updated May 9, 2023
donate-medonationdonation-paypalpaypalpaypal-donation
43
D · High Risk
CVEs total2
Unpatched2
Last CVEApr 1, 2025
Safety Verdict

Is Donate Me Safe to Use in 2026?

High Risk

Score 43/100

Donate Me carries significant security risk with 2 known CVEs, 2 still unpatched. Consider switching to a maintained alternative.

2 known CVEs 2 unpatched Last CVE: Apr 1, 2025Updated 2yr ago
Risk Assessment

The "donate-me" plugin version 1.2.5 exhibits a mixed security posture. While it demonstrates strengths in areas like avoiding dangerous functions, employing prepared statements for SQL queries, and not making external HTTP requests, significant concerns emerge from other analysis points. The complete lack of output escaping is a major red flag, directly exposing users to Cross-Site Scripting (XSS) vulnerabilities as indicated by the vulnerability history. Furthermore, the absence of nonce and capability checks on its single shortcode entry point is a critical oversight, potentially allowing unauthorized actions or data manipulation.

The vulnerability history for "donate-me" is particularly worrying, with two medium severity CVEs, both of which are currently unpatched. The historical prevalence of XSS and CSRF vulnerabilities suggests a consistent pattern of input sanitization and authorization weaknesses within the plugin. While the static analysis did not reveal active taint flows in this specific version, the historical context and the identified code signals strongly imply that such issues are recurring and have not been adequately addressed. The plugin's strengths are overshadowed by these critical weaknesses in output sanitization and access control, presenting a significant risk to WordPress sites using this version.

Key Concerns

  • Unpatched CVEs (2)
  • Output escaping missing
  • Nonce checks missing
  • Capability checks missing
Vulnerabilities
2

Donate Me Security Vulnerabilities

CVEs by Year

1 CVE in 2024 · unpatched
2024
1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2025-31778medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Donate Me <= 1.2.5 - Authenticated (Subscriber+) Stored Cross-Site Scripting

Apr 1, 2025Unpatched
CVE-2024-53776medium · 6.1Cross-Site Request Forgery (CSRF)

Donate Me <= 1.2.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting

Nov 28, 2024Unpatched
Code Analysis
Analyzed Mar 16, 2026

Donate Me Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Donate Me Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[donateme] donate-me.php:34
WordPress Hooks 1
filterplugin_action_linksdonate-me.php:43
Maintenance & Trust

Donate Me Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedMay 9, 2023
PHP min version
Downloads1K

Community Trust

Rating100/100
Number of ratings2
Active installs20
Developer Profile

Donate Me Developer Profile

raphaelheide

3 plugins · 30 total installs

77
trust score
Avg Security Score
76/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Donate Me

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<!-- DONATEME START --><!-- DONATEME END --><!-- DONATEME SHORTCODE START --><!-- DONATEME SHORTCODE END -->
FAQ

Frequently Asked Questions about Donate Me