
Yummy Cookies Security & Risk Analysis
wordpress.org/plugins/yummy-cookiesA lightweight plugin that extends Elementor's Dynamic Tags with Cookies 🍪
Is Yummy Cookies Safe to Use in 2026?
Generally Safe
Score 85/100Yummy Cookies has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "yummy-cookies" v1.0.0 plugin exhibits a strong security posture based on the provided static analysis. The complete absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code demonstrates good security practices by not utilizing dangerous functions, performing all SQL queries with prepared statements, and avoiding file operations and external HTTP requests. The vulnerability history being completely clear is also a positive indicator of the plugin's maintenance and security focus.
However, there are areas that warrant caution. The fact that 33% of output (2 out of 6) is not properly escaped presents a potential risk for Cross-Site Scripting (XSS) vulnerabilities if any of these outputs handle user-supplied data without proper sanitization. Additionally, the complete lack of nonce checks and capability checks across all potential entry points (though there are none identified) means that if any entry points were to be added in future versions, they would be inherently unprotected. While currently there are no known vulnerabilities, the potential for XSS due to unescaped output and the absence of critical security mechanisms like nonces and capability checks mean the plugin is not entirely risk-free.
In conclusion, "yummy-cookies" v1.0.0 is commendably secure in its current state due to its minimal attack surface and diligent use of prepared statements. The lack of historical vulnerabilities is a significant strength. The primary weaknesses lie in the unescaped output and the absence of nonce/capability checks, which represent latent risks that could be exploited if the plugin's functionality evolves without addressing these issues.
Key Concerns
- Unescaped output detected
- Missing nonce checks
- Missing capability checks
Yummy Cookies Security Vulnerabilities
Yummy Cookies Code Analysis
Output Escaping
Data Flow Analysis
Yummy Cookies Attack Surface
WordPress Hooks 3
Maintenance & Trust
Yummy Cookies Maintenance & Trust
Maintenance Signals
Community Trust
Yummy Cookies Alternatives
Qi Addons For Elementor
qi-addons-for-elementor
Qi Addons for Elementor is a comprehensive library of 60+ custom, flexible & easily styled Elementor widgets developed by Qode Interactive.
Addon Elements for Elementor (formerly Elementor Addon Elements)
addon-elements-for-elementor-page-builder
Addon Elements for Elementor comes with 40+ widgets and extensions to extend the power of Elementor Page Builder.
Mega Elements – Addons for Elementor
mega-elements-addons-for-elementor
A powerful and advanced all in one Elementor addons with unique styling features to create a beautiful website effortlessly.
Elements Plus!
elements-plus
Elements Plus! provides awesome custom widgets for the Elementor page builder. Buttons, Toggles, Gallery, Hotspots, and so much more!
Borderless – Addons and Templates for Elementor
borderless
Extend your favorite page builder and site design with the best free Elements, Widgets, Templates, and Toolkit for Block Editor, Elementor & WPBakery!
Yummy Cookies Developer Profile
1 plugin · 40 total installs
How We Detect Yummy Cookies
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/yummy-cookies/assets/js/yummy-cookies.jsyummy-cookies/assets/js/yummy-cookies.js?ver=HTML / DOM Fingerprints
yummy_cookies_ajax_object