cbnet MBP Auto-Activate Security & Risk Analysis

wordpress.org/plugins/cbnet-mbp-auto-activate

Automatically activate MaxBlogPress plugins, without registering and without subscribing to the MaxBlogPress email list.

40 active installs v1.2.1 PHP + WP 2.9+ Updated Apr 22, 2014
activationauto-activatecbnetmaxblogpress
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is cbnet MBP Auto-Activate Safe to Use in 2026?

Generally Safe

Score 85/100

cbnet MBP Auto-Activate has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The plugin "cbnet-mbp-auto-activate" v1.2.1 exhibits a seemingly strong security posture based on the provided static analysis, with no identified attack surface points and no critical code signals indicating immediate danger. The absence of dangerous functions, raw SQL queries, file operations, external HTTP requests, and taint flows suggests that developers have implemented foundational security practices. The complete lack of known vulnerabilities in its history further reinforces this positive impression, indicating a well-maintained and secure codebase over time.

However, a significant concern arises from the complete lack of output escaping. This means that any data outputted by the plugin, whether user-generated or from other sources, is not being sanitized. This could lead to Cross-Site Scripting (XSS) vulnerabilities if malicious data is injected and subsequently displayed to other users. Furthermore, the absence of any capability or nonce checks across its entry points, while currently not posing a direct risk due to the lack of exposed entry points, indicates a potential weakness if new functionalities are added without proper security considerations. The plugin's strengths lie in its limited attack surface and adherence to secure coding for SQL and external interactions, but the lack of output escaping is a critical oversight.

Key Concerns

  • Output escaping is not implemented
  • No capability checks on entry points
  • No nonce checks on entry points
Vulnerabilities
None known

cbnet MBP Auto-Activate Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

cbnet MBP Auto-Activate Release Timeline

v1.2.1Current
v1.2
v1.1.4
v1.1.3
v1.1.2
v1.1.1
v1.1
v1.0
Code Analysis
Analyzed Apr 16, 2026

cbnet MBP Auto-Activate Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Attack Surface

cbnet MBP Auto-Activate Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionplugins_loadedcbnet-mbp-auto-activate.php:35
actionadmin_initcbnet-mbp-auto-activate.php:84
actionadmin_menucbnet-mbp-auto-activate.php:85
Maintenance & Trust

cbnet MBP Auto-Activate Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedApr 22, 2014
PHP min version
Downloads22K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

cbnet MBP Auto-Activate Developer Profile

Chip Bennett

8 plugins · 3K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect cbnet MBP Auto-Activate

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cbnet-mbp-auto-activate/css/cbnet-mbp-auto-activate.css/wp-content/plugins/cbnet-mbp-auto-activate/js/cbnet-mbp-auto-activate.js
Script Paths
/wp-content/plugins/cbnet-mbp-auto-activate/js/cbnet-mbp-auto-activate.js
Version Parameters
cbnet-mbp-auto-activate/css/cbnet-mbp-auto-activate.css?ver=cbnet-mbp-auto-activate/js/cbnet-mbp-auto-activate.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about cbnet MBP Auto-Activate