GDPRess | Eliminate external requests to increase GDPR compliance Security & Risk Analysis

wordpress.org/plugins/gdpr-press

In January, 2022 a German court ruled that a website owner was in breach of GDPR and should pay a € 100,- fine, because embedded Google Fonts were use …

1K active installs v1.2.3 PHP 7.2+ WP 5.8+ Updated Sep 5, 2022
3rd-partyavgdsvgoexternalgdpr
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GDPRess | Eliminate external requests to increase GDPR compliance Safe to Use in 2026?

Generally Safe

Score 85/100

GDPRess | Eliminate external requests to increase GDPR compliance has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The gdpr-press v1.2.3 plugin exhibits a generally good security posture based on the provided static analysis. All identified entry points (AJAX handlers) are protected by capability checks, and there are no unpatched CVEs in its history. The plugin also correctly utilizes prepared statements for all SQL queries and incorporates nonce checks, which are crucial for preventing CSRF attacks. The absence of any recorded vulnerabilities or CVEs further strengthens this positive outlook.

However, the analysis does reveal some areas of concern that warrant attention. The presence of the `unserialize` function, while not directly linked to any current taint flows or vulnerabilities, is a known risky function that can lead to deserialization vulnerabilities if not handled with extreme care and input validation. Additionally, the fact that only 64% of output is properly escaped suggests a moderate risk of Cross-Site Scripting (XSS) vulnerabilities, particularly if the unescaped outputs handle user-controlled data. While the attack surface is small and protected, these specific code signals indicate potential weaknesses that could be exploited under certain conditions.

Key Concerns

  • Dangerous function 'unserialize' used
  • Significant portion of output not escaped
Vulnerabilities
None known

GDPRess | Eliminate external requests to increase GDPR compliance Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

GDPRess | Eliminate external requests to increase GDPR compliance Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
33
59 escaped
Nonce Checks
2
Capability Checks
5
File Operations
8
External Requests
2
Bundled Libraries
0

Dangerous Functions Found

unserialize$requests = unserialize($requests);includes\class-gdpress.php:126
unserialize$excluded = unserialize($excluded);includes\class-gdpress.php:154
unserialize$local = unserialize($local);includes\class-gdpress.php:182

Output Escaping

64% escaped92 total outputs
Attack Surface

GDPRess | Eliminate external requests to increase GDPR compliance Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_gdpress_fetchincludes\admin\class-ajax.php:31
authwp_ajax_gdpress_flushincludes\admin\class-ajax.php:32
WordPress Hooks 21
actionadmin_menuincludes\admin\class-settings.php:59
actionadmin_headincludes\admin\class-settings.php:67
filteradmin_footer_textincludes\admin\class-settings.php:70
filterupdate_footerincludes\admin\class-settings.php:71
actiongdpress_settings_tabincludes\admin\class-settings.php:74
actiongdpress_settings_tabincludes\admin\class-settings.php:75
actiongdpress_settings_contentincludes\admin\class-settings.php:78
actionadmin_initincludes\admin\class-settings.php:94
filtergdpress_help_contentincludes\admin\settings\class-help.php:21
filtergdpress_help_contentincludes\admin\settings\class-help.php:24
filtergdpress_manage_contentincludes\admin\settings\class-manage.php:42
filtergdpress_manage_contentincludes\admin\settings\class-manage.php:45
filtergdpress_manage_contentincludes\admin\settings\class-manage.php:47
filtergdpress_manage_contentincludes\admin\settings\class-manage.php:48
filtergdpress_manage_contentincludes\admin\settings\class-manage.php:49
actionadmin_noticesincludes\class-admin.php:28
actionadmin_initincludes\class-admin.php:29
filterhttp_headers_useragentincludes\class-download.php:90
actioninitincludes\class-gdpress.php:36
actiontemplate_redirectincludes\class-rewrite-url.php:63
filtergdpress_buffer_outputincludes\class-rewrite-url.php:65
Maintenance & Trust

GDPRess | Eliminate external requests to increase GDPR compliance Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedSep 5, 2022
PHP min version7.2
Downloads11K

Community Trust

Rating100/100
Number of ratings8
Active installs1K
Developer Profile

GDPRess | Eliminate external requests to increase GDPR compliance Developer Profile

Daan van den Bergh

3 plugins · 311K total installs

74
trust score
Avg Security Score
93/100
Avg Patch Time
597 days
View full developer profile
Detection Fingerprints

How We Detect GDPRess | Eliminate external requests to increase GDPR compliance

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gdpr-press/assets/css/gdpress-admin.css/wp-content/plugins/gdpr-press/assets/js/gdpress-admin.js
Script Paths
/wp-content/plugins/gdpr-press/assets/js/gdpress-admin.js
Version Parameters
gdpr-press/assets/css/gdpress-admin.css?ver=gdpr-press/assets/js/gdpress-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
gpress-navgdpress-flush
Data Attributes
id="gdpress-fetch"data-nonce
FAQ

Frequently Asked Questions about GDPRess | Eliminate external requests to increase GDPR compliance