Cookie Dunker Security & Risk Analysis

wordpress.org/plugins/cookie-dunker

Cookie Dunker replaces your embedded YouTube players with an ePrivacy-compliant version that does not serve tracking cookies.

20 active installs v1.7 PHP 5.6+ WP 5.1+ Updated Nov 14, 2019
cookiecookieseprivacyyoutube
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Cookie Dunker Safe to Use in 2026?

Generally Safe

Score 85/100

Cookie Dunker has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'cookie-dunker' plugin v1.7 exhibits an exceptionally strong security posture. The complete absence of identified entry points across AJAX handlers, REST API routes, shortcodes, and cron events is a significant strength, indicating that the plugin's functionality is not directly exposed to external manipulation without explicit user interaction or scheduled tasks. Furthermore, the code signals are overwhelmingly positive, with no dangerous functions, all SQL queries using prepared statements, and all identified outputs being properly escaped. The lack of file operations, external HTTP requests, and indications of security checks like nonce or capability checks on potential entry points (which are absent anyway) further reinforces this secure design. The plugin also has a clean vulnerability history, with no recorded CVEs of any severity, suggesting consistent security development practices. While the lack of identified flows in the taint analysis might be due to the limited attack surface or the analysis tool's capabilities, the overall picture is one of a highly secure plugin that adheres to best security practices. The primary concern, though minor, stems from the absence of any identified capability checks or nonce checks. While this is mitigated by the absence of entry points, it means that if any entry points were to be inadvertently introduced in future updates, they might lack these fundamental security measures.

Key Concerns

  • No capability checks on entry points
  • No nonce checks on entry points
Vulnerabilities
None known

Cookie Dunker Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Cookie Dunker Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Cookie Dunker Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterplugin_row_metacookie-dunker.php:15
filterembed_oembed_htmlcookie-dunker.php:32
filtervideo_embed_htmlcookie-dunker.php:33
filterfacebook_for_woocommerce_integration_pixel_enabledcookie-dunker.php:34
Maintenance & Trust

Cookie Dunker Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedNov 14, 2019
PHP min version5.6
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

Cookie Dunker Developer Profile

Hammy Havoc

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cookie Dunker

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Cookie Dunker