Cookielander Security & Risk Analysis

wordpress.org/plugins/cookielander

Save referral variables to temporary storage (cookies)

10 active installs v0.7 PHP + WP 3.0+ Updated Unknown
contact-formcookieslanding-pagelanding-referrerppc
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Cookielander Safe to Use in 2026?

Generally Safe

Score 100/100

Cookielander has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "cookielander" v0.7 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any discovered AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points significantly limits the potential attack surface. Furthermore, the code signals indicate a lack of dangerous functions, file operations, and external HTTP requests. The SQL queries are 100% prepared, which is excellent practice. The vulnerability history is also clean, with no known CVEs, indicating a potentially well-maintained and secure codebase over time.

However, a notable concern is the output escaping. While there are 15 outputs, only 73% are properly escaped, leaving 27% potentially vulnerable to cross-site scripting (XSS) attacks if the unescaped data originates from user input or untrusted sources. The lack of nonce checks and capability checks on the identified entry points (even though there are zero entry points detected) is also a weakness, as it implies that if any were to be added in the future without these checks, they would be immediately vulnerable. The zero taint analysis flows is positive but could also be a reflection of the limited attack surface discovered.

In conclusion, "cookielander" v0.7 demonstrates good development practices in several key areas, particularly in avoiding dangerous functions and securing database interactions. The clean vulnerability history is a significant positive. The primary weakness lies in the incomplete output escaping, which warrants attention to prevent potential XSS vulnerabilities. The absence of nonce and capability checks on identified entry points also represents a potential future risk.

Key Concerns

  • Incomplete output escaping (27% unescaped)
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Cookielander Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Cookielander Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
11 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

73% escaped15 total outputs
Attack Surface

Cookielander Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_enqueue_scriptscookielander-options.php:32
actionadmin_menucookielander-options.php:198
actionadmin_initcookielander-options.php:199
filterplugin_action_linkscookielander-options.php:217
actionadmin_noticescookielander-options.php:266
actioninitcookielander.php:33
actionsend_headerscookielander.php:109
Maintenance & Trust

Cookielander Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Cookielander Developer Profile

zaus

13 plugins · 5K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cookielander

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cookielander/cookielander.js/wp-content/plugins/cookielander/Ractive-decorators-addable.js
Script Paths
//cdnjs.cloudflare.com/ajax/libs/ractive/0.7.3/ractive.min.js
Version Parameters
cookielander.js?ver=Ractive-decorators-addable.js?ver=ractive.min.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- dump all the setings out as JSON --><!-- TODO: codemirror... --><!-- engage! -->
Data Attributes
name="cookielander[json]"
JS Globals
cookielander
FAQ

Frequently Asked Questions about Cookielander