Cookie Message Security & Risk Analysis

wordpress.org/plugins/cookie-message

EU cookie law message at the bottom of the screen.

100 active installs v1.2 PHP + WP 4.1+ Updated Feb 5, 2015
cookiecookiesmessagenotice
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Cookie Message Safe to Use in 2026?

Generally Safe

Score 85/100

Cookie Message has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "cookie-message" v1.2 plugin exhibits a generally good security posture with no reported vulnerabilities in its history and a strong adherence to secure coding practices in several areas. The complete absence of known CVEs, critical or high severity taint flows, and the exclusive use of prepared statements for SQL queries are significant strengths. However, the static analysis reveals a notable concern regarding output escaping, with only 17% of outputs being properly escaped. This could potentially lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is directly reflected in the output without adequate sanitization. While the attack surface is currently zero, this could change with future updates. The presence of file operations without explicit mention of sanitization also warrants attention. Overall, the plugin is well-maintained from a vulnerability history perspective, but the output escaping issue represents a tangible, albeit potentially low-impact, risk.

Key Concerns

  • Low percentage of properly escaped output
  • File operations present without sanitization info
Vulnerabilities
None known

Cookie Message Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Cookie Message Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
39
8 escaped
Nonce Checks
1
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

17% escaped47 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

4 flows2 with unsanitized paths
render_fields (register-settings-api.php:490)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Cookie Message Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actionwp_headcookie-message.php:23
actionwp_enqueue_scriptscookie-message.php:24
actionwp_footercookie-message.php:25
actionadmin_initcookie-message.php:26
actioninitregister-settings-api.php:18
actionadmin_menuregister-settings-api.php:19
actionadmin_initregister-settings-api.php:20
actionadmin_initregister-settings-api.php:21
actionadmin_enqueue_scriptsregister-settings-api.php:22
actionadmin_headregister-settings-api.php:35
filterregister_settings_api_cookie_messagesettings-array.php:2
Maintenance & Trust

Cookie Message Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedFeb 5, 2015
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Cookie Message Developer Profile

Jenst

7 plugins · 280 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cookie Message

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cookie-message/css/generated.css/wp-content/plugins/cookie-message/css/style.css/wp-content/plugins/cookie-message/js/custom.js
Version Parameters
cookie_message_style?timestamp=cookie_message_script?ver=1.0.0

HTML / DOM Fingerprints

CSS Classes
cm-messagecm-button-wrapcm-buttonicono-checkcm-acceptcm-text
Data Attributes
data-cookie-message
JS Globals
cookie_messagejQuery
Shortcode Output
<a href="
FAQ

Frequently Asked Questions about Cookie Message