Force To Terms & Conditions Security & Risk Analysis

wordpress.org/plugins/force-to-terms-conditions

Force To Updated Terms & Conditions plugin work for logged in user. So user will redirect to terms page automatically or notified term notice at t …

10 active installs v2.0.0 PHP + WP 5.0+ Updated Aug 23, 2021
force-termsredirectterms-and-condition
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Force To Terms & Conditions Safe to Use in 2026?

Generally Safe

Score 85/100

Force To Terms & Conditions has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "force-to-terms-conditions" plugin v2.0.0 exhibits a generally good security posture based on the static analysis. It demonstrates strong adherence to secure coding practices by avoiding dangerous functions, utilizing prepared statements for all SQL queries, and performing nonce and capability checks. The absence of file operations and external HTTP requests further reduces its attack surface. Taint analysis reveals no identified vulnerabilities with unsanitized paths, indicating a low risk of injection attacks originating from the plugin.

However, a notable weakness lies in the output escaping. While 70% of outputs are properly escaped, 30% are not. This represents a potential cross-site scripting (XSS) vulnerability if user-supplied data or dynamically generated content is output without proper sanitization. The plugin has no recorded vulnerability history, which is a positive indicator of its past security performance. Despite the minor concern with output escaping, the plugin's overall security design and lack of known vulnerabilities suggest a relatively safe option for users.

In conclusion, the plugin is well-designed from a security perspective, particularly in its handling of SQL and its limited attack surface. The primary area for improvement is ensuring 100% of output is properly escaped to mitigate any potential XSS risks. Its clean vulnerability history is a strong positive, suggesting consistent security focus from the developers. Users can generally trust this plugin, but monitoring for updates addressing the output escaping would be prudent.

Key Concerns

  • Unescaped output detected (30%)
Vulnerabilities
None known

Force To Terms & Conditions Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Force To Terms & Conditions Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Force To Terms & Conditions Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
14 escaped
Nonce Checks
3
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

70% escaped20 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

1 flows
<force-to-tnc-admin> (force-to-tnc-admin.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Force To Terms & Conditions Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[fttnc-agree] force-to-terms-conditions.php:282
[fttnc-agree-link] force-to-terms-conditions.php:283
WordPress Hooks 13
actionplugins_loadedforce-to-terms-conditions.php:38
actionadmin_menuforce-to-terms-conditions.php:39
actionsave_postforce-to-terms-conditions.php:40
actionwpforce-to-terms-conditions.php:41
actioninitforce-to-terms-conditions.php:42
actionwp_footerforce-to-terms-conditions.php:43
actionwp_headforce-to-terms-conditions.php:44
actionmanage_users_columnsforce-to-terms-conditions.php:45
actionmanage_users_custom_columnforce-to-terms-conditions.php:46
actionshow_user_profileforce-to-tnc-user-profile.php:5
actionedit_user_profileforce-to-tnc-user-profile.php:6
actionpersonal_options_updateforce-to-tnc-user-profile.php:30
actionedit_user_profile_updateforce-to-tnc-user-profile.php:31
Maintenance & Trust

Force To Terms & Conditions Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedAug 23, 2021
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Force To Terms & Conditions Developer Profile

Anas Bin Mukim

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Force To Terms & Conditions

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/force-to-terms-conditions/css/fttnc-style.css/wp-content/plugins/force-to-terms-conditions/js/fttnc-scripts.js
Script Paths
/wp-content/plugins/force-to-terms-conditions/js/fttnc-scripts.js
Version Parameters
force-to-terms-conditions/css/fttnc-style.css?ver=force-to-terms-conditions/js/fttnc-scripts.js?ver=

HTML / DOM Fingerprints

CSS Classes
force_to_term_notice_boxforce_totnc_noticeforce_totnc_notice_innerfttnc_form_wrapagreed_ok_message
Data Attributes
id="force_to_term_notice_box"data-fttnc-exclude-user
JS Globals
window.location
Shortcode Output
<div class="fttnc_form_wrap"><div class="agreed_ok_message"><a href="/login/">Login</a> to agree this term.
FAQ

Frequently Asked Questions about Force To Terms & Conditions