Agreement Security & Risk Analysis

wordpress.org/plugins/agreement

The Agreement plugin helps to create pop-up licence agreement or term to use before download any thing from post or page.

100 active installs v1.1 PHP + WP 3.5.2+ Updated Dec 10, 2024
attachattachmentslicence-agreementpopup-before-downloadterms-and-condition
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Agreement Safe to Use in 2026?

Generally Safe

Score 92/100

Agreement has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "agreement" plugin version 1.1 exhibits a generally positive security posture based on the provided static analysis and vulnerability history. The absence of AJAX handlers, REST API routes, shortcodes, cron events, and external HTTP requests significantly limits the attack surface. The code also demonstrates good practices by exclusively using prepared statements for SQL queries and not bundling any external libraries. This lack of known vulnerabilities and low attack surface suggests a well-maintained and securely coded plugin.

However, the static analysis reveals a critical concern: 100% of output is unescaped. This means that any dynamic content displayed by the plugin is not properly sanitized, creating a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Even with a limited attack surface, a single XSS vulnerability can have severe consequences. The lack of observed taint flows or dangerous functions is encouraging, but it does not mitigate the direct XSS risk posed by unescaped output.

In conclusion, while the "agreement" plugin has a strong foundation with a minimal attack surface and secure database practices, the complete lack of output escaping is a major security flaw that requires immediate attention. Addressing this single issue would dramatically improve the plugin's overall security.

Key Concerns

  • 100% of outputs unescaped
Vulnerabilities
None known

Agreement Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Agreement Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Agreement Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwp_enqueue_scriptsagreement.php:33
actionwp_footeragreement.php:35
actionadmin_menufunctions\agreement-functions.php:15
actionadmin_initfunctions\agreement-functions.php:16
Maintenance & Trust

Agreement Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedDec 10, 2024
PHP min version
Downloads7K

Community Trust

Rating94/100
Number of ratings9
Active installs100
Developer Profile

Agreement Developer Profile

Pranav Pathak

3 plugins · 1K total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Agreement

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/agreement/js/agreement.js/wp-content/plugins/agreement/css/agreement.css
Script Paths
plugins/agreement/js/agreement.js

HTML / DOM Fingerprints

CSS Classes
licence-agreementbaselicence-agreementlicence-submit-button
Shortcode Output
<div class='licence-agreementbase' style='display:none;'> </div><div class='licence-agreement'style='display:none;'><p>Change text from Agreement option in Settings
FAQ

Frequently Asked Questions about Agreement