
TAP Cookies Security & Risk Analysis
wordpress.org/plugins/tap-cookiesDisplay a information message about Europe Cookies Law
Is TAP Cookies Safe to Use in 2026?
Generally Safe
Score 85/100TAP Cookies has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "tap-cookies" plugin version 1.2.5 presents a mixed security posture. On the positive side, the plugin has no recorded vulnerability history, indicating a generally stable and well-maintained codebase in the past. The static analysis reveals a small attack surface with only two shortcodes and no AJAX handlers or REST API routes exposed without authentication. Furthermore, there are no dangerous functions, file operations, or external HTTP requests detected, which are common vectors for exploitation. The presence of nonce checks is also a positive indicator of security awareness.
However, there are areas for concern. The code analysis highlights that 50% of SQL queries are not using prepared statements, which could lead to SQL injection vulnerabilities if user-supplied data is not properly sanitized before being passed to these queries. Additionally, a significant portion of output (64%) is not properly escaped, opening the door to Cross-Site Scripting (XSS) attacks. The taint analysis also found two flows with unsanitized paths, which, while not classified as critical or high severity, still represent potential weaknesses where unvalidated data could be processed.
In conclusion, while the plugin has a good track record and a limited attack surface, the identified issues with SQL query preparation and output escaping require attention. Addressing these specific code-level weaknesses would significantly improve the plugin's overall security posture and mitigate potential risks of SQL injection and XSS.
Key Concerns
- SQL queries not using prepared statements
- Significant portion of output not escaped
- Flows with unsanitized paths detected
TAP Cookies Security Vulnerabilities
TAP Cookies Release Timeline
TAP Cookies Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
TAP Cookies Attack Surface
Shortcodes 2
WordPress Hooks 17
Maintenance & Trust
TAP Cookies Maintenance & Trust
Maintenance Signals
Community Trust
TAP Cookies Alternatives
Compliance by Hu-manity.co
cookie-notice
Intentional Consent for WordPress — GDPR, CCPA, CPRA & ePrivacy compliance with consent records, autoblocking & Google Consent Mode v2.
WP Consent API
wp-consent-api
Simple Consent API to read and register the current consent category.
Adapta RGPD
adapta-rgpd
La solución completa para el cumplimiento del RGPD y la LOPD GDD en español: Crea los textos legales, el banner de cookies y documenta los consentimie …
Asesor de Cookies RGPD para normativa europea
asesor-cookies-para-la-ley-en-espana
Este plugin le facilita la adaptación a la RGPD de su web a la política de cookies mostrando el aviso a los visitantes de su página y proporcionándole …
Cookies for Comments
cookies-for-comments
Sets a cookie on a random URL that is then checked when a comment is posted. If the cookie is missing the comment is marked as spam.
TAP Cookies Developer Profile
5 plugins · 80 total installs
How We Detect TAP Cookies
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/tap-cookies/public/css/tap-cookies.css/wp-content/plugins/tap-cookies/public/js/tap-cookies.js/wp-content/plugins/tap-cookies/public/js/tap-cookies.jstap-cookies/style.css?ver=tap-cookies/script.js?ver=HTML / DOM Fingerprints
tap-cookies-messagetap-cookies-linktap-cookies-button<!-- TAP Cookies: Start Settings --><!-- TAP Cookies: End Settings --><!-- TAP Cookies: Message -->data-tap-cookies-acceptdata-tap-cookies-rejecttap_cookies_params[tap_cookies_link][tap_cookies_button]