CC Devs Security & Risk Analysis

wordpress.org/plugins/cc-devs

Adds the ability to easily CC developers on all admin emails

20 active installs v1.0.4 PHP + WP 3.0+ Updated Mar 7, 2023
developersemail
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is CC Devs Safe to Use in 2026?

Generally Safe

Score 85/100

CC Devs has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "cc-devs" plugin v1.0.4 exhibits a generally strong security posture based on the provided static analysis. The absence of any identified attack surface, dangerous functions, file operations, or external HTTP requests is a positive indicator. Furthermore, all SQL queries are properly prepared, and the majority of output is escaped, demonstrating good coding practices in these critical areas. The lack of any recorded vulnerabilities or CVEs in its history also suggests a well-maintained and secure plugin.

However, there are a few areas of concern that temper this positive assessment. The complete absence of nonce checks and capability checks across all entry points is a significant security weakness. While the current attack surface is reported as zero, the introduction of any new AJAX handlers, REST API routes, or shortcodes without these fundamental security measures would immediately expose the plugin to critical vulnerabilities like Cross-Site Request Forgery (CSRF) and privilege escalation. The taint analysis also reported zero flows, which is positive, but it's worth noting that the scope of the analysis for taint might be limited if no flows were found at all, or it simply reflects the current code's safety.

In conclusion, "cc-devs" v1.0.4 demonstrates adherence to several important security best practices, particularly in its handling of database queries and output sanitation. Its clean vulnerability history is also reassuring. The primary weakness lies in the foundational security checks for user authentication and authorization. Developers should prioritize implementing nonce and capability checks on any future or existing entry points to prevent potential security breaches.

Key Concerns

  • Missing nonce checks on all entry points
  • Missing capability checks on all entry points
  • 80% output escaping (20% unescaped)
Vulnerabilities
None known

CC Devs Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

CC Devs Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

80% escaped5 total outputs
Attack Surface

CC Devs Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_initccdevs.php:47
filterwp_mailccdevs.php:111
actioninitccdevs.php:138
Maintenance & Trust

CC Devs Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedMar 7, 2023
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings3
Active installs20
Developer Profile

CC Devs Developer Profile

John Hawkins

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CC Devs

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
id="ccdev_list"name="ccdev_list"
FAQ

Frequently Asked Questions about CC Devs