Project World Impact Security & Risk Analysis

wordpress.org/plugins/project-world-impact

Integrate PWI Crowdfund, PWI GroupGive, and PWI Storyteller features into your WordPress site with our powerful plugin for nonprofit partners.

0 active installs v2.3 PHP 7.2+ WP 6.0+ Updated Unknown
crowdfundingdonationsfundraisinggroupgiveprojectworldimpact
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Project World Impact Safe to Use in 2026?

Generally Safe

Score 100/100

Project World Impact has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "project-world-impact" plugin v2.3 demonstrates a strong security posture based on the provided static analysis. The absence of shortcodes, cron events, and REST API routes significantly limits its attack surface. Crucially, all identified AJAX handlers are protected by authentication checks, and there are no unescaped outputs or dangerous functions detected. The code also shows good practices in using prepared statements for all SQL queries, robust nonce checks, and capability checks, along with zero taint flows of critical or high severity. The lack of any known vulnerabilities in its history further reinforces this positive assessment.

However, while the current analysis reveals no immediate critical flaws, a potential area for attention is the presence of three external HTTP requests. Without further context on the destination and purpose of these requests, they represent a minor vector for potential supply chain attacks or data exfiltration if the external services are compromised or malicious. The small number of entry points is a strength, but the plugin's reliance on external HTTP requests warrants a mention in the overall risk assessment. The plugin's current security profile is very good, with its strengths significantly outweighing any minor potential concerns.

In conclusion, "project-world-impact" v2.3 appears to be a securely developed plugin. Its adherence to common WordPress security best practices, such as input validation, output escaping, and proper authentication/authorization, is commendable. The absence of known vulnerabilities and the clean static analysis results suggest a low risk of exploitation. The only minor point to monitor would be the nature and trustworthiness of the external HTTP requests made by the plugin, but this is not a vulnerability in itself based on the data.

Key Concerns

  • External HTTP requests (3)
Vulnerabilities
None known

Project World Impact Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Project World Impact Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
73 escaped
Nonce Checks
5
Capability Checks
6
File Operations
0
External Requests
3
Bundled Libraries
0

Output Escaping

92% escaped79 total outputs
Data Flows
All sanitized

Data Flow Analysis

5 flows
mpwi_mcallback_page (includes\class-mpwi-admin.php:232)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Project World Impact Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_mpwi_save_gtm_settingsincludes\class-mpwi-gtm.php:9
authwp_ajax_mpwi_import_gtm_container_idincludes\class-mpwi-gtm.php:10
WordPress Hooks 9
actionadmin_initincludes\class-mpwi-admin.php:11
actionadmin_menuincludes\class-mpwi-admin.php:12
actionadmin_enqueue_scriptsincludes\class-mpwi-admin.php:13
actionadmin_noticesincludes\class-mpwi-admin.php:14
actionwp_headincludes\class-mpwi-gtm.php:13
actionwp_body_openincludes\class-mpwi-gtm.php:14
actionadmin_noticesincludes\mpwi-functions.php:107
actionmpwi_log_errorincludes\mpwi-functions.php:121
actionplugins_loadedproject-world-impact.php:42
Maintenance & Trust

Project World Impact Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedUnknown
PHP min version7.2
Downloads664

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Project World Impact Developer Profile

Ben Clarke

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Project World Impact

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/project-world-impact/assets/css/admin.css/wp-content/plugins/project-world-impact/assets/js/admin.js
Version Parameters
project-world-impact/assets/css/admin.css?ver=project-world-impact/assets/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
mpwi_design_settings_sectionmpwi_design_main_grid_colormpwi_design_heading_font_sizempwi_design_heading_colormpwi_design_description_font_sizempwi_design_button_font_size
Data Attributes
name="mpwi_design_settings[main_grid_color]"
JS Globals
mpwi_ajax_object
FAQ

Frequently Asked Questions about Project World Impact