Enable CORS Security & Risk Analysis

wordpress.org/plugins/enable-cors

Please read the plugin description before installing to ensure compatibility and avoid potential issues. This plugin will be free forever.

6K active installs v2.0.2 PHP 7.1+ WP 4.7+ Updated Feb 20, 2026
ajaxcorsenableerrorfix
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Enable CORS Safe to Use in 2026?

Generally Safe

Score 100/100

Enable CORS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The 'enable-cors' plugin v2.0.2 exhibits a strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events indicates a minimal attack surface. Crucially, all observed code signals are positive: no dangerous functions are used, SQL queries are 100% prepared, and all output is properly escaped. The presence of one capability check further suggests an attempt at securing functionalities, even if the attack surface is currently zero.

The taint analysis reveals no identified flows with unsanitized paths, and the vulnerability history is clean with zero known CVEs. This lack of historical issues and the current static analysis findings paint a picture of a well-developed and secure plugin. The primary strength lies in its simplicity and adherence to secure coding practices, with no apparent vulnerabilities or potential exploit vectors identified in this version.

However, the analysis does highlight a few areas for potential improvement, albeit minor given the current state. The lack of nonce checks on the zero AJAX handlers is technically a missed opportunity for security, even if it poses no immediate risk due to the absence of those handlers. Similarly, the capability check, while present, might be more of a placeholder if there are no actual user-facing features to protect. Overall, the plugin is highly secure for its current version, with its simplicity being its greatest asset.

Key Concerns

  • Missing nonce checks on AJAX handlers
Vulnerabilities
None known

Enable CORS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Enable CORS Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
22 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped22 total outputs
Attack Surface

Enable CORS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionplugins_loadedenable-cors.php:56
actionadmin_menusrc\AdminPage.php:23
filteradmin_footer_textsrc\AdminPage.php:34
filterupdate_footersrc\AdminPage.php:35
filterscript_loader_tagsrc\AdminPage.php:42
actionadmin_enqueue_scriptssrc\AdminPage.php:43
actionrest_api_initsrc\Plugin.php:81
actionrest_api_initsrc\Plugin.php:100
filterrest_pre_serve_requestsrc\Plugin.php:106
Maintenance & Trust

Enable CORS Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 20, 2026
PHP min version7.1
Downloads82K

Community Trust

Rating74/100
Number of ratings3
Active installs6K
Developer Profile

Enable CORS Developer Profile

Dev Kabir

1 plugin · 6K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Enable CORS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/enable-cors/assets/dist/main.css/wp-content/plugins/enable-cors/assets/dist/main.js
Version Parameters
enable-cors/assets/dist/main.css?ver=enable-cors/assets/dist/main.js?ver=

HTML / DOM Fingerprints

CSS Classes
enable-cors
JS Globals
enableCors
REST Endpoints
/wp-json/enable-cors/v2.0.2/settings
FAQ

Frequently Asked Questions about Enable CORS