Cookie Tasting Security & Risk Analysis

wordpress.org/plugins/cookie-tasting

Detect user login only with cookie. The best helper for cached WordPress sites.

10 active installs v1.0.11 PHP 7.0+ WP 5.0+ Updated Oct 27, 2020
cachecookiemembership
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Cookie Tasting Safe to Use in 2026?

Generally Safe

Score 85/100

Cookie Tasting has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "cookie-tasting" plugin v1.0.11 exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, direct SQL queries (all use prepared statements), file operations, external HTTP requests, and a complete lack of identified taint flows or unsanitized paths are highly positive indicators. The fact that all output is properly escaped further bolsters its security. Furthermore, the vulnerability history being completely clear of any CVEs, past or present, suggests a history of responsible development and maintenance.

However, the analysis does reveal a complete absence of any security checks, including nonces and capability checks, across all entry points. While the current attack surface is reported as zero, this absence of checks is a significant concern. If any new entry points were to be introduced in the future, they would be entirely unprotected, leaving the plugin vulnerable to various attacks. The plugin's strength lies in its current clean code, but its weakness lies in the lack of a defensive security framework, making it inherently less resilient to future development oversights.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Cookie Tasting Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Cookie Tasting Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Cookie Tasting Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionplugins_loadedcookie-tasting.php:50
actioninitincludes\js-helper.php:11
actionwp_enqueue_scriptsincludes\js-helper.php:28
filterquery_varsincludes\js-helper.php:36
filterrewrite_rules_arrayincludes\js-helper.php:52
actioninitincludes\js-helper.php:57
actionpre_get_postsincludes\js-helper.php:67
actionset_auth_cookieincludes\login-cookie.php:14
filtercookie_tasting_valuesincludes\login-cookie.php:15
actionclear_auth_cookieincludes\login-cookie.php:25
Maintenance & Trust

Cookie Tasting Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedOct 27, 2020
PHP min version7.0
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Cookie Tasting Developer Profile

TAROSKY INC.

12 plugins · 680 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cookie Tasting

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cookie-tasting/assets/js/cookie.js/wp-content/plugins/cookie-tasting/assets/js/heartbeat.js
Script Paths
/wp-content/plugins/cookie-tasting/assets/js/cookie.js/wp-content/plugins/cookie-tasting/assets/js/heartbeat.js
Version Parameters
cookie-tasting?ver=cookie-tasting-heartbeat?ver=

HTML / DOM Fingerprints

JS Globals
CookieTasting
REST Endpoints
/wp-json/cookie/v1/nonce
FAQ

Frequently Asked Questions about Cookie Tasting