TAP Cookies Security & Risk Analysis

wordpress.org/plugins/tap-cookies

Display a information message about Europe Cookies Law

20 active installs v1.2.5 PHP + WP 3.5.1+ Updated Jul 28, 2016
cookieseurope-cookie-law
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is TAP Cookies Safe to Use in 2026?

Generally Safe

Score 85/100

TAP Cookies has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "tap-cookies" plugin version 1.2.5 presents a mixed security posture. On the positive side, the plugin has no recorded vulnerability history, indicating a generally stable and well-maintained codebase in the past. The static analysis reveals a small attack surface with only two shortcodes and no AJAX handlers or REST API routes exposed without authentication. Furthermore, there are no dangerous functions, file operations, or external HTTP requests detected, which are common vectors for exploitation. The presence of nonce checks is also a positive indicator of security awareness.

However, there are areas for concern. The code analysis highlights that 50% of SQL queries are not using prepared statements, which could lead to SQL injection vulnerabilities if user-supplied data is not properly sanitized before being passed to these queries. Additionally, a significant portion of output (64%) is not properly escaped, opening the door to Cross-Site Scripting (XSS) attacks. The taint analysis also found two flows with unsanitized paths, which, while not classified as critical or high severity, still represent potential weaknesses where unvalidated data could be processed.

In conclusion, while the plugin has a good track record and a limited attack surface, the identified issues with SQL query preparation and output escaping require attention. Addressing these specific code-level weaknesses would significantly improve the plugin's overall security posture and mitigate potential risks of SQL injection and XSS.

Key Concerns

  • SQL queries not using prepared statements
  • Significant portion of output not escaped
  • Flows with unsanitized paths detected
Vulnerabilities
None known

TAP Cookies Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

TAP Cookies Release Timeline

v1.2.5Current
v1.2.2
v1.2.1
v1.2.0
Code Analysis
Analyzed Mar 16, 2026

TAP Cookies Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
1 prepared
Unescaped Output
21
12 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

50% prepared2 total queries

Output Escaping

36% escaped33 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
render_reset_form (admin\includes\settings\page-builders.php:137)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

TAP Cookies Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[tap_cookies] public\class-tap-cookies.php:143
[tap-cookies] public\class-tap-cookies.php:150
WordPress Hooks 17
actionwp_dashboard_setupadmin\class-tap-cookies-admin.php:73
actionadmin_initadmin\includes\settings\factories.php:39
actionadmin_initadmin\includes\settings\factories.php:70
actionpcs_render_option_pageadmin\includes\settings\factories.php:72
actionadmin_enqueue_scriptsadmin\includes\settings\fields.php:148
actionadmin_enqueue_scriptsadmin\includes\settings\fields.php:279
actionadmin_enqueue_scriptsadmin\includes\settings\fields.php:437
actionadmin_menuadmin\includes\settings\page-builders.php:24
actionadmin_enqueue_scriptsadmin\includes\settings\page-builders.php:37
actioninitpublic\class-tap-cookies.php:120
actionwpmu_new_blogpublic\class-tap-cookies.php:123
actionwp_enqueue_scriptspublic\class-tap-cookies.php:126
actionwp_enqueue_scriptspublic\class-tap-cookies.php:127
actionwp_footerpublic\class-tap-cookies.php:136
filterwidget_textpublic\class-tap-cookies.php:153
actionplugins_loadedtap-cookies.php:50
actionplugins_loadedtap-cookies.php:70
Maintenance & Trust

TAP Cookies Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJul 28, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

TAP Cookies Developer Profile

todoapuestas

5 plugins · 80 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect TAP Cookies

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/tap-cookies/public/css/tap-cookies.css/wp-content/plugins/tap-cookies/public/js/tap-cookies.js
Script Paths
/wp-content/plugins/tap-cookies/public/js/tap-cookies.js
Version Parameters
tap-cookies/style.css?ver=tap-cookies/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
tap-cookies-messagetap-cookies-linktap-cookies-button
HTML Comments
<!-- TAP Cookies: Start Settings --><!-- TAP Cookies: End Settings --><!-- TAP Cookies: Message -->
Data Attributes
data-tap-cookies-acceptdata-tap-cookies-reject
JS Globals
tap_cookies_params
Shortcode Output
[tap_cookies_link][tap_cookies_button]
FAQ

Frequently Asked Questions about TAP Cookies