Plugin: CBEARNING Security & Risk Analysis

wordpress.org/plugins/cbearnings

CBEARNING allows you to import the ENTIRE ClickBank Marketplace into your WordPress blog in seconds while

10 active installs v1.0 PHP + WP + Updated Unknown
cbearningclickbank-affiliate
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Plugin: CBEARNING Safe to Use in 2026?

Generally Safe

Score 100/100

Plugin: CBEARNING has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "cbearnings" v1.0 plugin exhibits a mixed security posture. On the positive side, it has a relatively small attack surface with no AJAX handlers or REST API routes that appear to be unprotected. Furthermore, there are no recorded vulnerabilities in its history, suggesting a potentially stable and secure codebase. The majority of SQL queries are also prepared, which is a good practice for preventing SQL injection. However, several significant concerns arise from the static analysis.

The most pressing issue is the extremely low rate of proper output escaping, with only 13% of outputs being escaped. This indicates a high likelihood of cross-site scripting (XSS) vulnerabilities, where user-supplied data could be injected into the page and executed by a victim's browser. The complete absence of nonce checks and capability checks for any potential entry points is also a major weakness, as it means any authenticated user, regardless of their role or permissions, could potentially trigger unintended actions or access sensitive data through the shortcodes. Taint analysis yielded no critical or high-severity flows, but this could be due to the limited scope of the analysis, especially given the lack of explicit security checks.

While the plugin has no known CVEs, this could be attributed to its obscurity or simply the lack of thorough security audits in the past. The low escaping rate and lack of authorization checks are serious flaws that significantly elevate the risk profile, outweighing the absence of recorded vulnerabilities. The plugin needs immediate attention to address output escaping and implement robust authorization checks for all entry points.

Key Concerns

  • Low output escaping rate (13%)
  • No nonce checks
  • No capability checks
  • SQL queries not always prepared (29% not prepared)
Vulnerabilities
None known

Plugin: CBEARNING Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Plugin: CBEARNING Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
5 prepared
Unescaped Output
13
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

SQL Query Safety

71% prepared7 total queries

Output Escaping

13% escaped15 total outputs
Attack Surface

Plugin: CBEARNING Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[CB_EARNINGS] cbearnings.php:338
[php] cbearnings.php:509
[PHP] cbearnings.php:510
WordPress Hooks 5
actionadmin_menucbearnings.php:52
filterthe_contentcbearnings.php:337
actionadmin_menucbearnings.php:341
actionadmin_initcbearnings.php:383
actionwidgets_initcbewidget.php:75
Maintenance & Trust

Plugin: CBEARNING Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating60/100
Number of ratings2
Active installs10
Alternatives

Plugin: CBEARNING Alternatives

No alternatives data available yet.

Developer Profile

Plugin: CBEARNING Developer Profile

prakash.m

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Plugin: CBEARNING

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrap_cbearnings
Shortcode Output
[CB_EARNINGS][CB_EARNINGS]Search[CB_EARNINGS]ClickBank Affiliate ID
FAQ

Frequently Asked Questions about Plugin: CBEARNING