Use Bunny DNS Security & Risk Analysis

wordpress.org/plugins/use-bunny-dns

Handles automatic purge of CDN pull zone on content change

20 active installs v2.0.0 PHP 8.0+ WP 5.3+ Updated Jan 20, 2026
bunny-cdnbunny-dnsdns-proxy
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Use Bunny DNS Safe to Use in 2026?

Generally Safe

Score 100/100

Use Bunny DNS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The plugin "use-bunny-dns" v2.0.0 exhibits a generally strong security posture based on the provided static analysis. The absence of any identified entry points (AJAX, REST API, shortcodes, cron events) significantly limits the potential attack surface. Furthermore, the code demonstrates good practice by using prepared statements exclusively for SQL queries and including a capability check for one identified interaction.

However, there are areas that warrant attention. A notable concern is the low percentage of properly escaped output (29%), which indicates a potential for cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled carefully in all output contexts. The presence of an external HTTP request, while not inherently insecure, should be scrutinized to ensure it is not vulnerable to SSRF or data leakage. The lack of nonce checks on any potential, albeit unidentified, entry points is also a weakness. The plugin's vulnerability history is a significant positive, with no recorded CVEs, suggesting a history of responsible development and patching.

In conclusion, the plugin benefits from a very small attack surface and good database security practices. The primary weakness lies in output escaping, posing a moderate risk of XSS. The clean vulnerability history is a strong indicator of overall developer diligence, but the lack of specific checks on what would typically be considered vulnerable entry points (even if none are explicitly identified here) prevents a perfect score. The plugin is likely secure for its current version and history, but the output escaping issue requires careful review.

Key Concerns

  • Low percentage of properly escaped output (29%)
  • External HTTP request without context
  • No nonce checks identified
Vulnerabilities
None known

Use Bunny DNS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Use Bunny DNS Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
6 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

29% escaped21 total outputs
Attack Surface

Use Bunny DNS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menuapp\Controllers\wpController.php:39
actionadmin_initapp\Controllers\wpController.php:40
actionadmin_noticesuse-bunny-dns.php:48
actiontransition_post_statususe-bunny-dns.php:57
actionsend_headersuse-bunny-dns.php:71
Maintenance & Trust

Use Bunny DNS Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 20, 2026
PHP min version8.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Use Bunny DNS Developer Profile

BoUk

5 plugins · 440 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Use Bunny DNS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/use-bunny-dns/vendor/monolog/monolog/src/Monolog/Formatter/LineFormatter.php/wp-content/plugins/use-bunny-dns/vendor/monolog/monolog/src/Monolog/Logger.php/wp-content/plugins/use-bunny-dns/vendor/monolog/monolog/src/Monolog/Handler/StreamHandler.php/wp-content/plugins/use-bunny-dns/vendor/bunny-dns/bunny-dns-php-sdk/src/Models/wpModel.php/wp-content/plugins/use-bunny-dns/vendor/bunny-dns/bunny-dns-php-sdk/src/Controllers/wpController.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Use Bunny DNS