Rebel Cookies Notification Security & Risk Analysis

wordpress.org/plugins/rebel-cookies-notification

Cookies plugin to display notification to users regarding cookie usage.

10 active installs v1.2 PHP + WP 3.0.1+ Updated Mar 1, 2015
cookiesplug-inrebelrebel-cookies-notification
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Rebel Cookies Notification Safe to Use in 2026?

Generally Safe

Score 85/100

Rebel Cookies Notification has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The rebel-cookies-notification plugin v1.2 demonstrates a generally good security posture based on the provided static analysis. The absence of an attack surface through AJAX, REST API, shortcodes, or cron events is a significant positive. Furthermore, the complete reliance on prepared statements for SQL queries and the presence of at least one capability check are commendable practices. The lack of known vulnerabilities in its history is also reassuring, suggesting a history of stable and secure development.

However, a critical concern arises from the extremely low percentage of properly escaped output (13%). This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data or data handled by the plugin might be directly rendered in the browser without adequate sanitization. While taint analysis and other code signals appear clean, the output escaping issue presents a tangible and significant security risk that could be exploited by attackers to inject malicious scripts.

In conclusion, while the plugin has strong foundational security with no external attack vectors and secure database interactions, the widespread lack of output escaping is a serious weakness. The vulnerability history is clean, which is a strength, but the static analysis highlights a critical area for improvement. Addressing the output escaping would significantly enhance the plugin's security.

Key Concerns

  • Insufficient output escaping (13% proper)
Vulnerabilities
None known

Rebel Cookies Notification Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Rebel Cookies Notification Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
1 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

13% escaped8 total outputs
Attack Surface

Rebel Cookies Notification Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwp_loadedrebel-cookies-notification.php:24
actionadmin_initrebel-cookies-notification.php:38
actionadmin_menurebel-cookies-notification.php:41
actionwp_footerrebel-cookies-notification.php:138
Maintenance & Trust

Rebel Cookies Notification Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedMar 1, 2015
PHP min version
Downloads2K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

Rebel Cookies Notification Developer Profile

anthony-b

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Rebel Cookies Notification

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/rebel-cookies-notification/jquery.cookie.js/wp-content/plugins/rebel-cookies-notification/javascript.js/wp-content/plugins/rebel-cookies-notification/style.css

HTML / DOM Fingerprints

CSS Classes
hello-containerclose
Data Attributes
name="rebel_option_name[option1]"name="rebel_option_name[option3]"name="rebel_option_name[option4]"name="rebel_option_name[option5]"name="rebel_option_name[option6]"name="rebel_option_name[option7]"
FAQ

Frequently Asked Questions about Rebel Cookies Notification