OrgHunter Security & Risk Analysis

wordpress.org/plugins/orghunter

Charity Search and Charity Donation Plugin. Add 2.1 million US charities to your WordPress site instantly. America’s most trusted charity resource!

10 active installs v1.1.1 PHP + WP 3.7+ Updated Aug 6, 2016
charitydonationorghuntersearchthird-party
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is OrgHunter Safe to Use in 2026?

Generally Safe

Score 85/100

OrgHunter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The orghunter plugin v1.1.1 exhibits a mixed security posture. On the positive side, the plugin has a notably small attack surface with no registered AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all identified SQL queries are properly prepared, indicating good database hygiene. The plugin also shows no history of reported vulnerabilities, which is a strong indicator of past security diligence.

However, there are significant areas of concern highlighted by the static analysis. The most critical finding is the presence of two taint flows with unsanitized paths, even though they are not classified as critical or high severity. This suggests potential for local file inclusion or other path-based vulnerabilities that could be exploited if these flows are triggered by user input. Additionally, a low percentage (22%) of output is properly escaped, indicating a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, especially since no nonce checks or capability checks are implemented on any potential entry points, which don't appear to exist based on the provided attack surface data.

In conclusion, while the plugin's minimal attack surface and secure SQL practices are commendable, the high rate of unescaped output and the presence of unsanitized path flows represent significant security weaknesses. The lack of any historical vulnerabilities should be viewed cautiously, as it might be a reflection of limited security auditing rather than proven invulnerability. Further investigation into the taint flows and output escaping is strongly recommended.

Key Concerns

  • Unsanitized path taint flows
  • Low percentage of properly escaped output
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

OrgHunter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

OrgHunter Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
32
9 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

22% escaped41 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
orghunter_charity_search_categories (api.php:31)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

OrgHunter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_initorghunter.php:48
actionadmin_menuorghunter.php:49
actionwidgets_initorghunter.php:80
actionwp_enqueue_scriptsorghunter.php:129
filterthe_titleorghunter.php:140
filterthe_contentorghunter.php:141
Maintenance & Trust

OrgHunter Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedAug 6, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

OrgHunter Developer Profile

Danillo Nunes

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect OrgHunter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/orghunter/orghunter-charity-search.css
Version Parameters
orghunter-charity-search.css?ver=

HTML / DOM Fingerprints

CSS Classes
orghunter-charity-search-results
Data Attributes
data-orghunter-charity-search-id
JS Globals
window.orghunter_charity_search
FAQ

Frequently Asked Questions about OrgHunter