WP Keys Giveaway Security & Risk Analysis

wordpress.org/plugins/wp-keys-giveaway

Do you have some keys for a software or videogame and want to give them to your users? This plugin is what you're looking for!

20 active installs v1.0.1 PHP + WP 3.0+ Updated Oct 12, 2013
beta-keys-giveawaygiveawaykeys-giveawaywp-keys-giveaway
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Keys Giveaway Safe to Use in 2026?

Generally Safe

Score 85/100

WP Keys Giveaway has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The wp-keys-giveaway v1.0.1 plugin exhibits a generally positive security posture with some notable concerns. A significant strength is the complete absence of raw SQL queries, with all 23 queries utilizing prepared statements. This greatly mitigates the risk of SQL injection vulnerabilities. Furthermore, the plugin has no recorded history of vulnerabilities, indicating a potentially mature and well-maintained codebase. However, the presence of one unprotected AJAX handler significantly increases the attack surface. While the plugin employs nonce checks and capability checks, this single entry point lacks proper authentication, making it a prime target for unauthenticated attackers who could potentially trigger unintended actions within the plugin.

The static analysis reveals no critical or high severity issues in taint analysis, and dangerous functions are also absent. The main area of concern stems from the unprotected AJAX handler, which represents a direct avenue for exploitation. The output escaping is also not fully comprehensive, with 31% of outputs not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-controlled data is involved in those outputs.

In conclusion, while the plugin demonstrates good practices in data handling (prepared statements) and has a clean vulnerability history, the single unprotected AJAX endpoint is a critical weakness that requires immediate attention. Addressing this missing authentication check is paramount to improving the plugin's overall security. The incomplete output escaping also warrants review to ensure user-provided data is handled safely.

Key Concerns

  • AJAX handler without auth checks
  • Outputs not properly escaped
Vulnerabilities
None known

WP Keys Giveaway Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Keys Giveaway Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
23 prepared
Unescaped Output
5
11 escaped
Nonce Checks
3
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared23 total queries

Output Escaping

69% escaped16 total outputs
Data Flows
All sanitized

Data Flow Analysis

3 flows
sh9_deletekey (key_giveaway.php:188)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

WP Keys Giveaway Attack Surface

Entry Points5
Unprotected1

AJAX Handlers 4

authwp_ajax_sh9_deletekeykey_giveaway.php:185
noprivwp_ajax_sh9_deletekeykey_giveaway.php:186
authwp_ajax_sh9_getkeykey_giveaway.php:246
noprivwp_ajax_sh9_getkeykey_giveaway.php:247

Shortcodes 1

[keys] key_giveaway.php:280
WordPress Hooks 8
actioninitkey_giveaway.php:60
actionadd_meta_boxeskey_giveaway.php:62
actionsave_postkey_giveaway.php:158
filterpost_updated_messageskey_giveaway.php:182
actionadmin_enqueue_scriptskey_giveaway.php:253
actionwp_enqueue_scriptskey_giveaway.php:286
actionwp_enqueue_scriptskey_giveaway.php:293
actionadmin_menukey_giveaway.php:306
Maintenance & Trust

WP Keys Giveaway Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedOct 12, 2013
PHP min version
Downloads3K

Community Trust

Rating46/100
Number of ratings8
Active installs20
Developer Profile

WP Keys Giveaway Developer Profile

itsnotabug

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Keys Giveaway

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-keys-giveaway/images/delete.png

HTML / DOM Fingerprints

CSS Classes
sh9_deletekey
Data Attributes
id="sh9_meta_box_iplock"name="sh9_meta_box_iplock"id="sh9_meta_box_loggedin"name="sh9_meta_box_loggedin"id="code"name="code"+6 more
Shortcode Output
[keys id=
FAQ

Frequently Asked Questions about WP Keys Giveaway