Borlabs Cookie - Cookie Opt-in Plugin For WordPress

Borlabs Cookie - Cookie Opt-in Plugin For WordPress v3.3.8

No permission to download
Decryption key:


Download Borlabs Cookie v3.3.8 - Cookie Opt-in Nulled Free
v3.3.8, April 23, 2025

ERROR RESOLVED Due to changes introduced in WordPress 6.8, an issue affected the automatic update process. This update may need to be installed manually via the plugin management. After the update, the automatic plugin update in the Borlabs Cookie Dashboard settings works correctly again.
Decryption key:


Download Borlabs Cookie v3.3.7 - Cookie Opt-in Nulled Free
v3.3.7, April 16, 2025

IMPROVED This update reschedules package updates to ensure more balanced server load distribution.
ERROR RESOLVED An error occurred in WordPress 6.8 due to translations being loaded too early. This update fixes the problem and restores compatibility with WordPress 6.8.
Decryption key:


Download Borlabs Cookie v3.3.2 - Cookie Opt-in Nulled Free
v3.3.2, March 18, 2025

ERROR RESOLVED Fixed an error with the new repeatable settings fields.
Decryption key:


Download Borlabs Cookie v3.2.14 - Cookie Opt-in Nulled Free
v3.2.14, February 26, 2025

IMPROVED Updated third-party dependencies, including the IAB TCF library to version 1.5.15.
ERROR RESOLVED Fixed a rare issue where the Legacy Importer failed to install a package and threw an error.
ERROR RESOLVED Fixed a rare issue where an email about a package update was sent despite email notifications being disabled. Kudos to Tim for finding the error.
Decryption key:


Changelog Not Found !
Decryption key:


Changelog Not Found !
Decryption key:

  • IMPROVED Improved log message when package installation fails due to an outdated version of Borlabs Cookie.
  • IMPROVED When installing a package for the first time, the "Auto Update" option is enabled by default.
  • IMPROVED The "Config is loaded" test in the Debug Console has been improved to detect third-party modifications.
  • IMPROVED The "Plugin URL is set correctly" test in the Debug Console has been improved to detect misconfigured protocols. Tips have been added to help resolve this issue.
  • IMPROVED The CSS of the Debug Console has been enhanced to prevent third-party CSS from overwriting the intended design.
  • ERROR RESOLVED An error occurred when accessing the Legacy Importer section if no legacy data was available for import.
  • ERROR RESOLVED Migration files now update the CSS and JavaScript files for the correct language of the instance in Multisite Networks.
  • ERROR RESOLVED The Debug Console and the library for backward compatibility now load correctly on older versions of WordPress.
Decryption key:


  • IMPROVED Support for PHP 8.2 has been improved.
  • IMPROVED The automatic update process has been improved. In earlier versions, there was a possibility that WordPress did not recognize that Borlabs Cookie should be updated automatically.
  • IMPROVED The Service Shortcode now supports third-party Shortcodes.
  • IMPROVED Multilingual plugin support has been improved. Borlabs Cookie now ensures that all default entries for Content Blockers, Providers, Services, and Service Groups are available in every language.
Decryption key:

  • NEW A new setting has been added to disable email notifications for packages that are updated automatically. Although we believe it's important to receive notifications for automatic updates, we have made this feature available due to popular customer demand. This feature is enabled (true) by default and must be manually disabled. Future updates will not change this default setting to false.
  • IMPROVED The handling of regex in Script Blockers and Style Blockers was improved.
Decryption key:


  • SECURITY UPDATE An XSS vulnerability has been discovered and fixed. This vulnerability is difficult for attackers to exploit as it requires an administrator to call the compromised log entry in the Borlabs cookie logs within 30 days. Previous data shows that attackers have attempted to perform SQL injections, but these have all failed. During the investigation, the XSS vulnerability and the possible attack scenario were recognised. All installations should therefore be urgently updated to version 3.1.4.

About us

  • Our community has been around for many years and pride ourselves on offering unbiased, critical discussion among people of all different backgrounds. We are working every day to make sure our community is one of the best.

Quick Navigation

User Menu