Doneren met Mollie Security & Risk Analysis

wordpress.org/plugins/doneren-met-mollie

This plugin is both suitable for one-time donations and for periodic payments. All payment methods of Mollie are integrated into the plugin.

4K active installs v2.10.10 PHP + WP 5.3+ Updated Nov 27, 2025
donatedonerenidealmollierecurring
98
A · Safe
CVEs total3
Unpatched0
Last CVEMar 27, 2025
Download
Safety Verdict

Is Doneren met Mollie Safe to Use in 2026?

Generally Safe

Score 98/100

Doneren met Mollie has a strong security track record. Known vulnerabilities have been patched promptly.

3 known CVEsLast CVE: Mar 27, 2025Updated 4mo ago
Risk Assessment

The "doneren-met-mollie" plugin v2.10.10 exhibits a generally good security posture with several positive indicators. The static analysis reveals a relatively small attack surface consisting of four shortcodes, all of which appear to be protected by nonce and capability checks. The plugin also demonstrates a strong commitment to secure coding practices, with a high percentage of SQL queries using prepared statements and a significant majority of outputs being properly escaped. The presence of file operations and external HTTP requests is noted, but their context and security implications are not detailed in the provided data.

However, the taint analysis reveals a potential area of concern. While no critical or high severity taint flows were identified, seven high-severity flows with unsanitized paths were detected. This suggests that user-supplied input might not be adequately sanitized in certain execution paths, potentially leading to vulnerabilities if exploited. Furthermore, the plugin's vulnerability history shows three medium-severity CVEs, specifically related to Cross-site Scripting and Exposure of Sensitive Information. Although currently unpatched CVEs are zero, the recurring nature of these vulnerability types indicates a persistent weakness in input validation or output escaping in specific scenarios.

In conclusion, "doneren-met-mollie" v2.10.10 has strengths in its controlled attack surface and adoption of secure coding practices for SQL and output escaping. Nevertheless, the identified taint flows and historical vulnerability patterns necessitate careful attention. The seven high-severity taint flows with unsanitized paths are the most pressing concern, alongside the historical tendency towards XSS and information exposure vulnerabilities. Addressing these specific areas is crucial for further enhancing the plugin's security.

Key Concerns

  • High severity taint flows with unsanitized paths
  • Medium severity historical CVEs (3 total)
Vulnerabilities
3

Doneren met Mollie Security Vulnerabilities

CVEs by Year

1 CVE in 2021
2021
1 CVE in 2024
2024
1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
3

3 total CVEs

CVE-2025-30779medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Doneren met Mollie <= 2.10.7 - Authenticated (Contributor+) Stored Cross-Site Scripting

Mar 27, 2025 Patched in 2.10.8 (7d)
CVE-2024-29767medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Doneren met Mollie <= 2.10.2 - Unauthenticated Reflected Cross-Site Scripting via search

Mar 25, 2024 Patched in 2.10.3 (5d)
CVE-2021-4377medium · 6.5Exposure of Sensitive Information to an Unauthorized Actor

Doneren met Mollie <= 2.8.4 - Information Disclosure

Jan 22, 2021 Patched in 2.8.5 (1096d)
Code Analysis
Analyzed Mar 16, 2026

Doneren met Mollie Code Analysis

Dangerous Functions
0
Raw SQL Queries
19
37 prepared
Unescaped Output
43
221 escaped
Nonce Checks
4
Capability Checks
2
File Operations
1
External Requests
2
Bundled Libraries
0

SQL Query Safety

66% prepared56 total queries

Output Escaping

84% escaped264 total outputs
Data Flows
10 unsanitized

Data Flow Analysis

15 flows10 with unsanitized paths
process_bulk_action (includes\class-donations-table.php:114)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Doneren met Mollie Attack Surface

Entry Points4
Unprotected0

Shortcodes 4

[doneren_met_mollie] includes\class-start.php:20
[doneren_met_mollie_total] includes\class-start.php:21
[doneren_met_mollie_donors] includes\class-start.php:22
[doneren_met_mollie_goal] includes\class-start.php:23
WordPress Hooks 9
actionadmin_menuincludes\class-admin.php:17
actionadmin_initincludes\class-admin.php:18
actionadmin_post_dmm_exportincludes\class-admin.php:19
filterplugin_row_metaincludes\class-admin.php:20
actionadmin_noticesincludes\class-admin.php:23
actioninitincludes\class-start.php:18
filterquery_varsincludes\class-webhook.php:18
actionparse_requestincludes\class-webhook.php:19
actioninitincludes\class-webhook.php:20
Maintenance & Trust

Doneren met Mollie Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedNov 27, 2025
PHP min version
Downloads119K

Community Trust

Rating90/100
Number of ratings23
Active installs4K
Developer Profile

Doneren met Mollie Developer Profile

Nick van Wobbie

2 plugins · 7K total installs

77
trust score
Avg Security Score
97/100
Avg Patch Time
168 days
View full developer profile
Detection Fingerprints

How We Detect Doneren met Mollie

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/doneren-met-mollie/assets/js/custom.js/wp-content/plugins/doneren-met-mollie/assets/css/style.css
Script Paths
/wp-content/plugins/doneren-met-mollie/assets/js/custom.js
Version Parameters
doneren-met-mollie/assets/js/custom.js?ver=doneren-met-mollie/assets/css/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
dmm-donate-form
Data Attributes
data-plugin-name="doneren-met-mollie"data-plugin-version="2.10.10"
JS Globals
dmm_plugin_options
Shortcode Output
[doneren_met_mollie][doneren_met_mollie_total][doneren_met_mollie_donors][doneren_met_mollie_goal]
FAQ

Frequently Asked Questions about Doneren met Mollie