Zedna eBook download Security & Risk Analysis

wordpress.org/plugins/ebook-download

Allow user to download your ebook custom file when insert an email.

20 active installs v1.5 PHP + WP 3.0.4+ Updated Mar 12, 2020
downloadebookfile
84
B · Generally Safe
CVEs total1
Unpatched0
Last CVEMar 29, 2016
Safety Verdict

Is Zedna eBook download Safe to Use in 2026?

Mostly Safe

Score 84/100

Zedna eBook download is generally safe to use though it hasn't been updated recently. 1 past CVE were resolved. Keep it updated.

1 known CVELast CVE: Mar 29, 2016Updated 6yr ago
Risk Assessment

The ebook-download plugin version 1.5 exhibits a mixed security posture. While the static analysis shows a commendable lack of direct attack surface entry points like AJAX handlers, REST API routes, and shortcodes, indicating good design in preventing common web attacks, there are significant underlying concerns. The taint analysis reveals flows with unsanitized paths, including one of high severity. This suggests a potential for directory traversal or similar path manipulation vulnerabilities, even if not directly exposed through typical entry points. The plugin's vulnerability history, with one known high-severity CVE for 'Improper Limitation of a Pathname to a Restricted Directory' from 2016, strongly corroborates these taint analysis findings. Although the CVE is currently patched, the pattern of path-related vulnerabilities is a red flag. Furthermore, the moderate percentage of SQL queries not using prepared statements and a significant portion of output not being properly escaped present further risks of SQL injection and Cross-Site Scripting (XSS) respectively. The presence of nonce checks is positive, but the complete absence of capability checks on potential entry points is a weakness. In conclusion, while the plugin has mitigated some common attack vectors, the lingering risks from unsanitized paths and less-than-ideal handling of SQL and output present notable security weaknesses that warrant careful consideration.

Key Concerns

  • High severity taint flow with unsanitized paths
  • Moderate percentage of SQL queries not prepared
  • Significant percentage of outputs not escaped
  • Path Traversal vulnerability history
  • No capability checks found
Vulnerabilities
1

Zedna eBook download Security Vulnerabilities

CVEs by Year

1 CVE in 2016
2016
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

CVE-2016-10924high · 7.5Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Zedna eBook download < 1.2 - Directory Traversal

Mar 29, 2016 Patched in 1.2 (2856d)
Code Analysis
Analyzed Mar 16, 2026

Zedna eBook download Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
4 prepared
Unescaped Output
34
58 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

57% prepared7 total queries

Output Escaping

63% escaped92 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

6 flows4 with unsanitized paths
ebook_download_emails_page_handler (ebookdownload.php:409)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Zedna eBook download Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
actionwp_enqueue_scriptsebookdownload.php:68
actionplugins_loadedebookdownload.php:170
actionadmin_initebookdownload.php:387
actionadmin_menuebookdownload.php:389
actioninitebookdownload.php:619
actionwidgets_initebookdownload.php:624
actionwidgets_initebookdownload.php:625
actioninitebookdownload.php:655
actionadmin_menuebookdownload.php:674
actionsave_postebookdownload.php:675
actionadmin_headebookdownload.php:676
actionsave_postwidget-ebookdownload.php:17
actiondeleted_postwidget-ebookdownload.php:18
actionswitch_themewidget-ebookdownload.php:19
Maintenance & Trust

Zedna eBook download Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedMar 12, 2020
PHP min version
Downloads7K

Community Trust

Rating60/100
Number of ratings2
Active installs20
Developer Profile

Zedna eBook download Developer Profile

Radek Mezulanik

15 plugins · 570 total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
2856 days
View full developer profile
Detection Fingerprints

How We Detect Zedna eBook download

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ebook-download/style.css

HTML / DOM Fingerprints

HTML Comments
<!-- Load language file --><!-- # Load language file --><!-- PART 1. Defining Custom Database Table --><!-- ============================================================================ -->+34 more
FAQ

Frequently Asked Questions about Zedna eBook download