
Use Bunny DNS Security & Risk Analysis
wordpress.org/plugins/use-bunny-dnsHandles automatic purge of CDN pull zone on content change
Is Use Bunny DNS Safe to Use in 2026?
Generally Safe
Score 100/100Use Bunny DNS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin "use-bunny-dns" v2.0.0 exhibits a generally strong security posture based on the provided static analysis. The absence of any identified entry points (AJAX, REST API, shortcodes, cron events) significantly limits the potential attack surface. Furthermore, the code demonstrates good practice by using prepared statements exclusively for SQL queries and including a capability check for one identified interaction.
However, there are areas that warrant attention. A notable concern is the low percentage of properly escaped output (29%), which indicates a potential for cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled carefully in all output contexts. The presence of an external HTTP request, while not inherently insecure, should be scrutinized to ensure it is not vulnerable to SSRF or data leakage. The lack of nonce checks on any potential, albeit unidentified, entry points is also a weakness. The plugin's vulnerability history is a significant positive, with no recorded CVEs, suggesting a history of responsible development and patching.
In conclusion, the plugin benefits from a very small attack surface and good database security practices. The primary weakness lies in output escaping, posing a moderate risk of XSS. The clean vulnerability history is a strong indicator of overall developer diligence, but the lack of specific checks on what would typically be considered vulnerable entry points (even if none are explicitly identified here) prevents a perfect score. The plugin is likely secure for its current version and history, but the output escaping issue requires careful review.
Key Concerns
- Low percentage of properly escaped output (29%)
- External HTTP request without context
- No nonce checks identified
Use Bunny DNS Security Vulnerabilities
Use Bunny DNS Code Analysis
Output Escaping
Use Bunny DNS Attack Surface
WordPress Hooks 5
Maintenance & Trust
Use Bunny DNS Maintenance & Trust
Maintenance Signals
Community Trust
Use Bunny DNS Alternatives
Use Bunny DNS Developer Profile
5 plugins · 440 total installs
How We Detect Use Bunny DNS
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/use-bunny-dns/vendor/monolog/monolog/src/Monolog/Formatter/LineFormatter.php/wp-content/plugins/use-bunny-dns/vendor/monolog/monolog/src/Monolog/Logger.php/wp-content/plugins/use-bunny-dns/vendor/monolog/monolog/src/Monolog/Handler/StreamHandler.php/wp-content/plugins/use-bunny-dns/vendor/bunny-dns/bunny-dns-php-sdk/src/Models/wpModel.php/wp-content/plugins/use-bunny-dns/vendor/bunny-dns/bunny-dns-php-sdk/src/Controllers/wpController.php