Taboola Security & Risk Analysis

wordpress.org/plugins/taboola

Use the Taboola plugin to generate revenue from native ads and drive engagement with editorial content.

3K active installs v3.0.2 PHP + WP 5.2+ Updated Oct 29, 2025
ad-networksadscontent-recommendationsdiscoverytaboola
100
A · Safe
CVEs total1
Unpatched0
Last CVEJul 24, 2023
Safety Verdict

Is Taboola Safe to Use in 2026?

Generally Safe

Score 100/100

Taboola has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Jul 24, 2023Updated 5mo ago
Risk Assessment

The Taboola plugin v3.0.2 exhibits a mixed security posture. On the positive side, the static analysis reveals a very small attack surface with zero identified entry points, indicating strong architectural controls against direct exploitation. Furthermore, the absence of critical or high severity taint analysis findings is encouraging. However, there are several areas of concern that temper this positive outlook.

The code analysis highlights a significant reliance on direct SQL queries with only 17% using prepared statements, which is a substantial risk for SQL injection vulnerabilities. The low percentage of properly escaped output (41%) also presents a risk of Cross-Site Scripting (XSS) vulnerabilities. The plugin performs file operations and relies on a single nonce check, but critically, it has zero capability checks on its entry points, leaving its functionality potentially accessible to unauthenticated users if any latent vulnerabilities are discovered.

The vulnerability history shows one medium severity CVE for CSRF, which was patched. While the absence of unpatched vulnerabilities is good, the fact that a CSRF vulnerability has existed in the past suggests that the plugin's development might not always prioritize robust security practices. The overall conclusion is that while the plugin's current version has a limited attack surface, the underlying code quality regarding SQL sanitization and output escaping, coupled with a past CSRF vulnerability, necessitates caution.

Key Concerns

  • Raw SQL queries without prepared statements
  • Low percentage of properly escaped output
  • No capability checks on entry points
  • Past medium severity CVE (CSRF)
Vulnerabilities
1

Taboola Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2023-38398medium · 4.3Cross-Site Request Forgery (CSRF)

Taboola <= 2.0.1 - Cross-Site Request Forgery to Plugin Settings Update

Jul 24, 2023 Patched in 20.2 (183d)
Code Analysis
Analyzed Mar 16, 2026

Taboola Code Analysis

Dangerous Functions
0
Raw SQL Queries
5
1 prepared
Unescaped Output
24
17 escaped
Nonce Checks
1
Capability Checks
0
File Operations
8
External Requests
0
Bundled Libraries
0

SQL Query Safety

17% prepared6 total queries

Output Escaping

41% escaped41 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<taboola_widget> (taboola_widget.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Taboola Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
actionadmin_inittaboola_widget.php:72
actionwidgets_inittaboola_widget.php:76
actionadmin_menutaboola_widget.php:84
filterplugin_action_linkstaboola_widget.php:85
actionwp_headtaboola_widget.php:94
actionwp_headtaboola_widget.php:96
actionwp_footertaboola_widget.php:113
filterthe_contenttaboola_widget.php:116
filterthe_contenttaboola_widget.php:117
actiontemplate_redirecttaboola_widget.php:120
actionshutdowntaboola_widget.php:121
actiontemplate_redirecttaboola_widget.php:123
actionshutdowntaboola_widget.php:124
actionwp_enqueue_scriptstaboola_widget.php:986
Maintenance & Trust

Taboola Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.0
Last updatedOct 29, 2025
PHP min version
Downloads51K

Community Trust

Rating0/100
Number of ratings0
Active installs3K
Developer Profile

Taboola Developer Profile

Taboola

3 plugins · 3K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
183 days
View full developer profile
Detection Fingerprints

How We Detect Taboola

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/taboola/js/taboola-backend.js/wp-content/plugins/taboola/js/taboola-widget.js/wp-content/plugins/taboola/js/taboola-frontend.js/wp-content/plugins/taboola/css/taboola-backend.css
Script Paths
https://cdn.taboola.com/webpush/tsw.js

HTML / DOM Fingerprints

CSS Classes
taboola-widget
HTML Comments
<!-- Taboola Widget --><!-- Taboola Content -->
Data Attributes
data-taboola-widgetdata-taboola-publisher
JS Globals
window.taboolaSettingswindow.taboolaWidgetwindow.taboolaFrontend
REST Endpoints
/wp-json/taboola/v1/settings
Shortcode Output
[taboola]
FAQ

Frequently Asked Questions about Taboola