Cool Virtual Keyboard Security & Risk Analysis

wordpress.org/plugins/cool-virtual-keyboard

This plugin adds virtual keyboard for all text inputs and textareas on your site.

70 active installs v0.21 PHP + WP 3.0.1+ Updated Sep 6, 2016
keyboardvirtual
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Cool Virtual Keyboard Safe to Use in 2026?

Generally Safe

Score 85/100

Cool Virtual Keyboard has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The 'cool-virtual-keyboard' plugin v0.21 exhibits a generally positive security posture due to the absence of known vulnerabilities and a lack of direct code signals indicating common attack vectors like dangerous functions or raw SQL queries. The static analysis reveals a remarkably small attack surface with zero entry points, which is a strong indication of good security practices in terms of user interaction points. However, there are notable concerns stemming from the taint analysis, which identified two flows with unsanitized paths. While these did not reach critical or high severity in this analysis, the presence of unsanitized paths is a precursor to potential vulnerabilities, especially if they involve user-controllable input. Furthermore, the output escaping is only properly handled for 25% of the outputs, suggesting a risk of cross-site scripting (XSS) vulnerabilities. The complete lack of vulnerability history is a positive sign, but it does not negate the risks identified in the static analysis. In conclusion, while the plugin benefits from a minimal attack surface and no known CVEs, the identified unsanitized paths and poor output escaping represent significant areas of potential weakness that require attention.

Key Concerns

  • Unsanitized paths found in taint analysis
  • Low percentage of properly escaped output
Vulnerabilities
None known

Cool Virtual Keyboard Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Cool Virtual Keyboard Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

25% escaped4 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
CVK_VirtKey_options_page (virtual_keyboard.php:11)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Cool Virtual Keyboard Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuvirtual_keyboard.php:332
actionwp_enqueue_scriptsvirtual_keyboard.php:333
actionwp_enqueue_scriptsvirtual_keyboard.php:334
actionwp_footervirtual_keyboard.php:335
Maintenance & Trust

Cool Virtual Keyboard Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedSep 6, 2016
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs70
Developer Profile

Cool Virtual Keyboard Developer Profile

jj1981ua

2 plugins · 80 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cool Virtual Keyboard

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cool-virtual-keyboard/css/virt-keyboard-style.css
Script Paths
/wp-content/plugins/cool-virtual-keyboard/js/virtual-keyboard.js

HTML / DOM Fingerprints

CSS Classes
wrapoptions
Data Attributes
name="CVK_virtkeyboard_layout"value="ar"value="cn"value="en"value="fr"value="ge"+10 more
JS Globals
CVK_langStringArray
FAQ

Frequently Asked Questions about Cool Virtual Keyboard