Cookie Confirm Security & Risk Analysis

wordpress.org/plugins/cookie-confirm

Cookie Confirm allows you to easily insert a customisable notification for your users to choose and save their cookie preferences.

100 active installs v0.4 PHP + WP 3.3.2+ Updated Nov 12, 2012
complianceconfirmconsentcookieeu
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Cookie Confirm Safe to Use in 2026?

Generally Safe

Score 85/100

Cookie Confirm has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "cookie-confirm" plugin version 0.4 exhibits a concerning lack of security best practices despite having no known vulnerabilities or identified critical taint flows. While the plugin boasts a zero attack surface from a traditional perspective (no AJAX, REST API, shortcodes, or cron events) and uses prepared statements for SQL queries, the static analysis reveals significant issues. A complete absence of output escaping (0% properly escaped) for all 25 identified outputs is a critical flaw. This means any user-provided input that is displayed by the plugin could be vulnerable to Cross-Site Scripting (XSS) attacks, allowing attackers to inject malicious scripts into a user's browser. Furthermore, the complete lack of nonce checks and capability checks on any potential entry points (even though there are zero identified) suggests a general disregard for input validation and authorization, which is a significant security weakness. The plugin's vulnerability history is clean, but this is likely due to the limited attack surface and the possibility that the output escaping flaw has not yet been discovered or exploited. Overall, while the plugin appears simple and free of known exploits, the fundamental flaw in output escaping presents a substantial risk.

Key Concerns

  • Output escaping missing for all outputs
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Cookie Confirm Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Cookie Confirm Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
25
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped25 total outputs
Attack Surface

Cookie Confirm Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwp_enqueue_scriptscookie-confirm.php:28
actionwp_footercookie-confirm.php:30
actionadmin_inittheme-options.php:3
actionadmin_menutheme-options.php:4
Maintenance & Trust

Cookie Confirm Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedNov 12, 2012
PHP min version
Downloads21K

Community Trust

Rating70/100
Number of ratings2
Active installs100
Developer Profile

Cookie Confirm Developer Profile

Andy Charrington

5 plugins · 900 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cookie Confirm

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
http://assets.cookieconsent.silktide.com/current/plugin.min.jshttp://assets.cookieconsent.silktide.com/current/style.min.css

HTML / DOM Fingerprints

CSS Classes
cc-notification-logocc-notification-permissions
Data Attributes
id="fcw_logo"id="cc-notification-logo"id="cc-notification-permissions"
JS Globals
cc.initialisewindow.cc
FAQ

Frequently Asked Questions about Cookie Confirm