Advanced Hotjar Security & Risk Analysis

wordpress.org/plugins/advanced-hotjar

Load Hotjar and prevent it from tracking admins, logged-in users, and IP addresses.

40 active installs v1.0.0 PHP + WP 3.8+ Updated May 1, 2020
analyticsheatmapshotjarinsightsrecordings
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Advanced Hotjar Safe to Use in 2026?

Generally Safe

Score 85/100

Advanced Hotjar has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "advanced-hotjar" v1.0.0 plugin exhibits a generally positive security posture based on the provided static analysis. The complete absence of known CVEs and a clean vulnerability history are strong indicators that the plugin has been developed with security in mind, or has been well-maintained to address any past issues. The code analysis reveals no dangerous functions, no SQL queries that are not prepared, and no file operations, external HTTP requests, or cron events, which significantly reduces the potential attack surface. However, a concerning aspect is the low percentage of properly escaped output (36%). This indicates a risk of cross-site scripting (XSS) vulnerabilities, particularly if user-supplied data is being outputted without sufficient sanitization. The lack of nonces and capability checks on entry points, though currently zero in number, could become a significant risk if new AJAX handlers, REST API routes, or shortcodes are introduced in future versions without proper security measures. The absence of taint analysis results is neutral, as it could mean no complex flows were found or that the analysis was limited. Overall, the plugin is relatively secure due to its limited attack surface and clean history, but the output escaping deficiency warrants attention and improvement to prevent potential XSS attacks.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Advanced Hotjar Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Advanced Hotjar Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Advanced Hotjar Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

36% escaped11 total outputs
Attack Surface

Advanced Hotjar Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_menuadvanced-hotjar.php:14
actionadmin_initadvanced-hotjar.php:15
actioninitadvanced-hotjar.php:126
actionwp_headadvanced-hotjar.php:140
actionwp_headadvanced-hotjar.php:143
actionwp_headadvanced-hotjar.php:146
Maintenance & Trust

Advanced Hotjar Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedMay 1, 2020
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

Advanced Hotjar Developer Profile

Jerome

2 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Advanced Hotjar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
https://static.hotjar.com/c/hotjar-*.js?sv=*

HTML / DOM Fingerprints

CSS Classes
wrapregular-textlarge-text
HTML Comments
Hotjar Tracking Code for <!-- ... -->
Data Attributes
name="configure_hotjar_option_name[status]"name="configure_hotjar_option_name[hotjar_id]"name="configure_hotjar_option_name[tracking]"name="configure_hotjar_option_name[ip_addresses]"
JS Globals
window.hj
FAQ

Frequently Asked Questions about Advanced Hotjar