GDPR Helper using CSP Security & Risk Analysis

wordpress.org/plugins/gdpr-helper

This plugin allows easy addition of Content Security Policy

10 active installs v1.2.1 PHP 7.0+ WP 4.7+ Updated Unknown
content-security-policycspdsgvogdprsecurity
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GDPR Helper using CSP Safe to Use in 2026?

Generally Safe

Score 100/100

GDPR Helper using CSP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "gdpr-helper" plugin version 1.2.1 exhibits a generally strong security posture based on the provided static analysis. The plugin demonstrates good practices by having no identified attack surface points (AJAX, REST API, shortcodes, cron events) that are exposed without authentication or proper permission checks. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests, coupled with 100% of SQL queries utilizing prepared statements, are significant strengths. The single nonce check is a positive indicator. However, a concerning aspect is the output escaping, with only 45% of outputs properly escaped. This could potentially lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not sufficiently sanitized before being displayed to the user.

The vulnerability history shows no recorded CVEs, which is an excellent sign and suggests a lack of previously exploited or publicly disclosed security flaws. This, combined with the clean taint analysis (no unsanitized paths or critical/high severity flows), further reinforces the idea that the plugin has been developed with security in mind. Despite the positive history, the moderate output escaping rate remains a notable weakness that warrants attention and potential remediation to ensure a more robust security profile.

Key Concerns

  • Insufficient output escaping
Vulnerabilities
None known

GDPR Helper using CSP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

GDPR Helper using CSP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
24
20 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

45% escaped44 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
gdprhelper__set_cookies (includes\ghMain.php:49)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

GDPR Helper using CSP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionadmin_initincludes\backendPage.php:12
actionadmin_menuincludes\backendPage.php:13
actionadmin_enqueue_scriptsincludes\backendPage.php:14
actionelementor/widget/render_contentincludes\elementor\mapHandler.php:10
actionelementor/widgets/registerincludes\elementor\widgetShortcode.php:13
actioninitincludes\ghMain.php:13
actioninitincludes\ghMain.php:15
actioninitincludes\ghMain.php:27
actioninitincludes\ghMain.php:30
Maintenance & Trust

GDPR Helper using CSP Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedUnknown
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

GDPR Helper using CSP Developer Profile

bpassini

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GDPR Helper using CSP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gdpr-helper/css/backend_style.css/wp-content/plugins/gdpr-helper/js/backend_script.js
Script Paths
/wp-content/plugins/gdpr-helper/js/backend_script.js
Version Parameters
gdpr-helper/css/backend_style.css?ver=gdpr-helper/js/backend_script.js?ver=

HTML / DOM Fingerprints

JS Globals
GH__PLUGIN_URL
FAQ

Frequently Asked Questions about GDPR Helper using CSP