Mightycause Donation Forms and Embeds Security & Risk Analysis

wordpress.org/plugins/mightycause-widgets

Easily embed Mightycause donation buttons, widgets, or forms on your WordPress website with no coding required.

100 active installs v1.0.5 PHP 7.2+ WP 5.0+ Updated Dec 10, 2025
charitydonationfundraisingmightycausenonprofit
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mightycause Donation Forms and Embeds Safe to Use in 2026?

Generally Safe

Score 100/100

Mightycause Donation Forms and Embeds has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The mightycause-widgets plugin exhibits a mixed security posture. On the positive side, it demonstrates good coding practices by utilizing prepared statements for all SQL queries and properly escaping all output, indicating a strong defense against common injection and XSS vulnerabilities originating from these areas. The absence of dangerous functions, file operations, and recorded vulnerabilities in its history are also positive indicators. However, significant concerns arise from the presence of an unprotected REST API route, which represents a direct entry point into the plugin's functionality without any authentication or permission checks. The plugin also lacks nonce checks and capability checks for its entry points, which are crucial for preventing CSRF and unauthorized access to sensitive actions. The plugin's static analysis reveals a small but present attack surface, with a single REST API route identified as an unprotected entry point, which is a notable weakness.

While the plugin's vulnerability history is clean, this should not be interpreted as complete security assurance, especially given the identified unprotected entry point. The lack of critical or high severity vulnerabilities in the past is encouraging, but the current analysis highlights potential weaknesses that could be exploited if not addressed. The primary risk stems from the unprotected REST API route, which could allow unauthorized users to interact with the plugin's features. The absence of nonce and capability checks further exacerbates this risk by leaving the plugin vulnerable to potential cross-site request forgery (CSRF) attacks or unauthorized privilege escalation if the REST API route handles sensitive operations. Ultimately, while the plugin has strengths in SQL and output handling, the unprotected REST API route and missing authentication/authorization checks on entry points are significant security concerns that require immediate attention.

Key Concerns

  • Unprotected REST API route
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Mightycause Donation Forms and Embeds Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Mightycause Donation Forms and Embeds Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
12 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped12 total outputs
Attack Surface
1 unprotected

Mightycause Donation Forms and Embeds Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

GET/wp-json/mightycause/v1/formsblocks\class-mightycause-blocks.php:48
WordPress Hooks 9
actioninitblocks\class-mightycause-blocks.php:23
actionrest_api_initblocks\class-mightycause-blocks.php:24
actionadmin_menuincludes\class-mightycause-embeds.php:60
actionadmin_initincludes\class-mightycause-embeds.php:61
actionenqueue_block_editor_assetsincludes\class-mightycause-embeds.php:62
actionadmin_enqueue_scriptsincludes\class-mightycause-embeds.php:63
actionwp_enqueue_scriptsincludes\class-mightycause-embeds.php:64
actionadmin_enqueue_scriptsincludes\class-mightycause-embeds.php:65
actionplugins_loadedmightycause-widgets.php:28
Maintenance & Trust

Mightycause Donation Forms and Embeds Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 10, 2025
PHP min version7.2
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Mightycause Donation Forms and Embeds Developer Profile

mightycause

1 plugin · 100 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mightycause Donation Forms and Embeds

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mightycause-widgets/js/block.js/wp-content/plugins/mightycause-widgets/css/admin.css
Script Paths
https://downloads.mightycause.com/widgets/v1/embed.js
Version Parameters
mightycause-widgets/js/block.js?ver=mightycause-widgets/css/admin.css?ver=

HTML / DOM Fingerprints

CSS Classes
mightycause-donation-formresizablealignfullnon-resizable
Data Attributes
id="MC-donation-f
JS Globals
mightycauseBlockData
REST Endpoints
/mightycause/v1/forms
Shortcode Output
<div class="mightycause-donation-form<p>No form selected.No available forms.
FAQ

Frequently Asked Questions about Mightycause Donation Forms and Embeds