
Plugin: CBEARNING Security & Risk Analysis
wordpress.org/plugins/cbearningsCBEARNING allows you to import the ENTIRE ClickBank Marketplace into your WordPress blog in seconds while
Is Plugin: CBEARNING Safe to Use in 2026?
Generally Safe
Score 100/100Plugin: CBEARNING has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "cbearnings" v1.0 plugin exhibits a mixed security posture. On the positive side, it has a relatively small attack surface with no AJAX handlers or REST API routes that appear to be unprotected. Furthermore, there are no recorded vulnerabilities in its history, suggesting a potentially stable and secure codebase. The majority of SQL queries are also prepared, which is a good practice for preventing SQL injection. However, several significant concerns arise from the static analysis.
The most pressing issue is the extremely low rate of proper output escaping, with only 13% of outputs being escaped. This indicates a high likelihood of cross-site scripting (XSS) vulnerabilities, where user-supplied data could be injected into the page and executed by a victim's browser. The complete absence of nonce checks and capability checks for any potential entry points is also a major weakness, as it means any authenticated user, regardless of their role or permissions, could potentially trigger unintended actions or access sensitive data through the shortcodes. Taint analysis yielded no critical or high-severity flows, but this could be due to the limited scope of the analysis, especially given the lack of explicit security checks.
While the plugin has no known CVEs, this could be attributed to its obscurity or simply the lack of thorough security audits in the past. The low escaping rate and lack of authorization checks are serious flaws that significantly elevate the risk profile, outweighing the absence of recorded vulnerabilities. The plugin needs immediate attention to address output escaping and implement robust authorization checks for all entry points.
Key Concerns
- Low output escaping rate (13%)
- No nonce checks
- No capability checks
- SQL queries not always prepared (29% not prepared)
Plugin: CBEARNING Security Vulnerabilities
Plugin: CBEARNING Code Analysis
SQL Query Safety
Output Escaping
Plugin: CBEARNING Attack Surface
Shortcodes 3
WordPress Hooks 5
Maintenance & Trust
Plugin: CBEARNING Maintenance & Trust
Maintenance Signals
Community Trust
Plugin: CBEARNING Alternatives
No alternatives data available yet.
Plugin: CBEARNING Developer Profile
1 plugin · 10 total installs
How We Detect Plugin: CBEARNING
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
wrap_cbearnings[CB_EARNINGS][CB_EARNINGS]Search[CB_EARNINGS]ClickBank Affiliate ID