Donations Widget Security & Risk Analysis

wordpress.org/plugins/donations

Accept donations from your readers via AlertPay, Moneybookers and/or PayPal.

10 active installs v1.0.2 PHP + WP 2.8+ Updated Dec 4, 2010
alertpaydonationsmoneybookerspaypalwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Donations Widget Safe to Use in 2026?

Generally Safe

Score 85/100

Donations Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "donations" plugin v1.0.2 exhibits a concerning security posture despite a clean vulnerability history and zero known CVEs. The static analysis reveals a complete lack of output escaping, meaning all 37 identified output points are potentially vulnerable to cross-site scripting (XSS) attacks. This is a critical weakness that can allow attackers to inject malicious code into the plugin's output, which could then be executed in the browsers of other users.

Furthermore, the taint analysis indicates that both analyzed flows have unsanitized paths. While these are not classified as critical or high severity, they still point to potential vulnerabilities where user-supplied data could be mishandled. The absence of nonce checks, capability checks, and unprotected AJAX/REST API endpoints is notable, but the lack of any such entry points significantly mitigates immediate risks in these areas. The plugin's strengths lie in its use of prepared statements for SQL queries and the absence of file operations and external HTTP requests, demonstrating good practices in those specific domains.

In conclusion, while the plugin has a clean past and avoids common pitfalls like raw SQL or unprotected entry points, the pervasive lack of output escaping is a severe flaw that significantly elevates its risk profile. This weakness, combined with the identified unsanitized taint flows, means the plugin requires immediate attention to address potential XSS vulnerabilities.

Key Concerns

  • All outputs are unescaped
  • Unsanitized taint flows detected
Vulnerabilities
None known

Donations Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Donations Widget Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Donations Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
37
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped37 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
widget_donations_control (donations.php:155)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Donations Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actioninitdonations.php:40
Maintenance & Trust

Donations Widget Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.0
Last updatedDec 4, 2010
PHP min version
Downloads9K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Donations Widget Developer Profile

mohanjith

4 plugins · 80 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Donations Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/donations/images/alertpay_logo.png/wp-content/plugins/donations/images/mb_orange_donate_with.gif/wp-content/plugins/donations/images/pp_donate_LG.gif/wp-content/plugins/donations/images/pixel.gif

HTML / DOM Fingerprints

CSS Classes
payment_formalertpaymoneybookerspaypal
Data Attributes
name="ap_purchasetype"name="ap_merchant"name="ap_itemname"name="ap_itemcode"name="ap_quantity"name="ap_returnurl"+16 more
FAQ

Frequently Asked Questions about Donations Widget