Apollo Site Tools Security & Risk Analysis

wordpress.org/plugins/apollo-site-tools

Easily add Google Analytics, Facebook Pixel, and other tracking codes to your WordPress site, plus contact form functionality and more.

10 active installs v3.0 PHP 7.2+ WP 5.0+ Updated Mar 26, 2025
analyticscontact-formfacebook-pixelgoogle-analyticstracking-codes
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Apollo Site Tools Safe to Use in 2026?

Generally Safe

Score 92/100

Apollo Site Tools has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "apollo-site-tools" plugin v3.0 demonstrates a generally good security posture with several positive indicators. Notably, there are no known CVEs in its history, suggesting a history of stable and secure development or that vulnerabilities, if any, have been promptly addressed. The plugin also shows a strong emphasis on security checks, with nonce checks and capability checks present on its entry points. However, the code analysis reveals areas for improvement. While the presence of prepared statements is good, 71% of SQL queries are not using them, which can be a significant risk if not handled with extreme care. Furthermore, 34% of output escaping is not properly handled, posing a potential cross-site scripting (XSS) risk. The single file operation also warrants attention, as it could be a vector for unauthorized file modifications if not secured properly.

Despite the absence of critical taint flows and dangerous functions, the percentage of unescaped outputs and non-prepared SQL queries are the primary concerns. The plugin's attack surface is relatively small, and all identified entry points appear to have authentication checks, which is a significant strength. The lack of external HTTP requests is also a positive sign, reducing the risk of supply chain attacks or compromised external dependencies. In conclusion, while "apollo-site-tools" v3.0 has a clean vulnerability history and implements some good security practices, the unaddressed SQL queries and output escaping present tangible risks that should be mitigated to further harden the plugin's security.

Key Concerns

  • SQL queries not using prepared statements
  • Output not properly escaped
Vulnerabilities
None known

Apollo Site Tools Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Apollo Site Tools Code Analysis

Dangerous Functions
0
Raw SQL Queries
10
4 prepared
Unescaped Output
39
76 escaped
Nonce Checks
3
Capability Checks
5
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

29% prepared14 total queries

Output Escaping

66% escaped115 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
render_contacts_page (wp_ga_main.php:1120)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Apollo Site Tools Attack Surface

Entry Points4
Unprotected0

AJAX Handlers 1

authwp_ajax_apollo_export_contactswp_ga_main.php:1452

Shortcodes 3

[apollo_form] wp_ga_main.php:66
[apollo_instagram_feed] wp_ga_main.php:67
[include_file] wp_ga_main.php:68
WordPress Hooks 11
actionadmin_menuwp_ga_main.php:45
actionadmin_initwp_ga_main.php:46
actionplugins_loadedwp_ga_main.php:51
filterwp_mail_fromwp_ga_main.php:57
filterwp_mail_from_namewp_ga_main.php:58
actionwp_headwp_ga_main.php:88
actionwp_headwp_ga_main.php:93
actionwp_headwp_ga_main.php:98
actionwp_headwp_ga_main.php:103
actionwp_footerwp_ga_main.php:107
actioninitwp_ga_main.php:1517
Maintenance & Trust

Apollo Site Tools Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedMar 26, 2025
PHP min version7.2
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Apollo Site Tools Developer Profile

apollodatasolutions

1 plugin · 10 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Apollo Site Tools

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/apollo-site-tools/js/apollo-admin.js/wp-content/plugins/apollo-site-tools/js/apollo-frontend.js/wp-content/plugins/apollo-site-tools/css/apollo-frontend.css
Script Paths
/wp-content/plugins/apollo-site-tools/js/apollo-admin.js/wp-content/plugins/apollo-site-tools/js/apollo-frontend.js
Version Parameters
/wp-content/plugins/apollo-site-tools/js/apollo-admin.js?ver=/wp-content/plugins/apollo-site-tools/js/apollo-frontend.js?ver=/wp-content/plugins/apollo-site-tools/css/apollo-frontend.css?ver=

HTML / DOM Fingerprints

CSS Classes
apollo-site-tools-custom-css
HTML Comments
Apollo Site Tools Contact FormApollo Site Tools Instagram FeedApollo Site Tools Include File
JS Globals
apollo_frontend_params
REST Endpoints
/wp-json/apollo-site-tools/v1/get_instagram_posts
Shortcode Output
[apollo_form][apollo_instagram_feed][include_file]
FAQ

Frequently Asked Questions about Apollo Site Tools