Terms Before Download Security & Risk Analysis

wordpress.org/plugins/terms-before-download

Shows a popup dialog with terms and conditions (EULA) that must be accepted before a file can be downloaded

70 active installs v1.0.5 PHP + WP 3.5+ Updated Aug 13, 2025
downloadeulalicenseterms
79
B · Generally Safe
CVEs total1
Unpatched1
Last CVEMar 31, 2025
Safety Verdict

Is Terms Before Download Safe to Use in 2026?

Mostly Safe

Score 79/100

Terms Before Download is generally safe to use. 1 past CVE were resolved. Keep it updated.

1 known CVE 1 unpatched Last CVE: Mar 31, 2025Updated 7mo ago
Risk Assessment

The plugin "terms-before-download" v1.0.5 exhibits a mixed security posture. On the positive side, the static analysis reveals adherence to good coding practices, with no dangerous functions, all SQL queries using prepared statements, and all identified outputs properly escaped. There are no file operations or external HTTP requests, which are common vectors for vulnerabilities. The absence of taint analysis findings further suggests that direct code execution or data corruption risks stemming from unsanitized input are currently not detected.

However, a significant concern arises from the plugin's vulnerability history. It has one known unpatched medium severity CVE related to Cross-site Scripting (XSS). The fact that this vulnerability is recent (March 2025) and remains unpatched is a critical red flag, indicating a potential for exploitation by attackers. While the static analysis found no immediate vulnerabilities within the current codebase, the historical pattern of an XSS vulnerability implies that the developers may not be fully addressing security issues or that their security testing is insufficient.

In conclusion, while the current codebase demonstrates some good security practices, the presence of an unpatched medium severity XSS vulnerability significantly diminishes the overall security of this plugin. Users should be aware of this historical vulnerability and consider the risks associated with using a plugin that has a known, unaddressed security flaw. The lack of any capability checks or nonce checks on its entry points (shortcodes) could also be a concern if those shortcodes handle user-provided data that is then displayed or processed without further sanitization, though no explicit issues were flagged by the static analysis.

Key Concerns

  • Unpatched CVE (Medium severity)
  • No capability checks on entry points
  • No nonce checks on entry points
Vulnerabilities
1

Terms Before Download Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-31614medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Terms Before Download <= 1.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting

Mar 31, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Terms Before Download Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Terms Before Download Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[tbd_link] terms-before-download.php:29
[tbd_terms] terms-before-download.php:30
Maintenance & Trust

Terms Before Download Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedAug 13, 2025
PHP min version
Downloads4K

Community Trust

Rating94/100
Number of ratings3
Active installs70
Developer Profile

Terms Before Download Developer Profile

hiroprot

2 plugins · 270 total installs

81
trust score
Avg Security Score
82/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Terms Before Download

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/terms-before-download/terms-before-download.php

HTML / DOM Fingerprints

CSS Classes
tbd_link
Data Attributes
data-url
Shortcode Output
<a class='tbd_link' href='#' data-url=<div id='tbd_terms'
FAQ

Frequently Asked Questions about Terms Before Download