
Double the Donation – A workplace giving tool Security & Risk Analysis
wordpress.org/plugins/double-the-donationDouble the Donation – Easily add our matching gifts plugin and volunteering plugin on your site to help your fundraising efforts
Is Double the Donation – A workplace giving tool Safe to Use in 2026?
Generally Safe
Score 97/100Double the Donation – A workplace giving tool has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.
The "double-the-donation" plugin v3.1.0 exhibits a generally strong security posture based on the static analysis. It demonstrates good practices by utilizing prepared statements for all SQL queries, proper output escaping for the vast majority of outputs, and incorporating nonce and capability checks. The absence of dangerous functions, file operations, and critical/high severity taint flows is also positive. However, the plugin does make two external HTTP requests, which, while not inherently problematic, could represent a potential attack vector if the target endpoints are compromised or if the requests are made without proper validation of the returned data.
The vulnerability history presents a significant concern. While there are currently no unpatched vulnerabilities, the plugin has a history of 3 medium severity CVEs, specifically related to Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF). The commonality of these vulnerability types in the past suggests a recurring pattern in how user input is handled or how actions are protected. The fact that these vulnerabilities existed and were later patched indicates that the developers are responsive to security issues, but it also highlights areas where the plugin has previously been susceptible to exploitation.
In conclusion, "double-the-donation" v3.1.0 has commendable technical security practices in its current build. The code analysis reveals a well-hardened codebase with minimal exploitable entry points and secure data handling for SQL. The primary area of caution stems from its past vulnerability record, which indicates a need for continued vigilance and robust security testing to prevent the recurrence of XSS and CSRF issues. The presence of external HTTP requests warrants a review of their implementation for potential security implications.
Key Concerns
- Previous Medium severity XSS vulnerabilities
- Previous Medium severity CSRF vulnerabilities
- External HTTP requests present
Double the Donation – A workplace giving tool Security Vulnerabilities
CVEs by Year
Severity Breakdown
3 total CVEs
Double the Donation <= 3.0.0 - Authenticated (Admin+) Stored Cross-Site Scripting
Double the Donation <= 2.0.0 - Cross-Site Request Forgery
Double the Donation <= 2.0.0 - Authenticated (Administrator+) Stored Cross-Site Scripting
Double the Donation – A workplace giving tool Release Timeline
Double the Donation – A workplace giving tool Code Analysis
Output Escaping
Double the Donation – A workplace giving tool Attack Surface
Shortcodes 2
WordPress Hooks 4
Maintenance & Trust
Double the Donation – A workplace giving tool Maintenance & Trust
Maintenance Signals
Community Trust
Double the Donation – A workplace giving tool Alternatives
Double the Donation – A workplace giving tool Developer Profile
1 plugin · 1K total installs
How We Detect Double the Donation – A workplace giving tool
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/double-the-donation/includes/css/dtddonation.css/wp-content/plugins/double-the-donation/includes/js/dtddonation.jshttps://doublethedonation.com/api/js/ddplugin.jsHTML / DOM Fingerprints
dd-container<!-- Double the Donation Admin --><!-- Matching gifts plugin for nonprofits, powered by Double the Donation --><!-- API Key is empty. Double the Donation will not load. --><!-- If the api key is present, print the following. -->+5 moredata-api-keydata-volunteer-grant-specificDDCONF<div id="dd-container"></div>