Attrace Security & Risk Analysis

wordpress.org/plugins/attrace

Custom made dedicated blockchain capable of registering and auditing any advertisement click on chain (sale or no-sale). This concept enables anybody …

10 active installs v2.0.21 PHP 7.0+ WP 5.0+ Updated Dec 22, 2020
affiliateblockchaintracking
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Attrace Safe to Use in 2026?

Generally Safe

Score 85/100

Attrace has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The attrace plugin v2.0.21 presents a generally positive security posture based on the provided static analysis. The absence of known CVEs and a clean vulnerability history are strong indicators of a well-maintained and secure plugin. The code analysis shows a good adoption of prepared statements for SQL queries and a reasonable rate of output escaping, suggesting developers are mindful of common web vulnerabilities. The limited attack surface, consisting solely of shortcodes, is also a positive sign, especially with no immediately obvious unprotected entry points.

However, there are areas for improvement. The complete lack of nonce checks is a significant concern, particularly as it applies to potentially sensitive operations that might be triggered via shortcodes, even if no AJAX or REST API endpoints are directly exposed without authentication. While the taint analysis found no critical or high-severity issues, this doesn't fully negate the risk associated with missing nonces, as they are a fundamental layer of defense against CSRF attacks. The limited capability checks also suggest a potential for privilege escalation if an attacker can manipulate shortcode behavior.

In conclusion, attrace v2.0.21 appears to be a relatively secure plugin, largely due to its clean vulnerability history and proactive use of prepared statements. The primary weakness lies in the absence of nonce checks, which introduces a notable risk for Cross-Site Request Forgery (CSRF) attacks, and the limited number of capability checks. Addressing these specific points would significantly strengthen the plugin's overall security.

Key Concerns

  • Missing nonce checks on entry points
  • Insufficient capability checks for entry points
  • Less than 70% of output escaping is proper
Vulnerabilities
None known

Attrace Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Attrace Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
12 prepared
Unescaped Output
14
15 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

80% prepared15 total queries

Output Escaping

52% escaped29 total outputs
Attack Surface

Attrace Attack Surface

Entry Points4
Unprotected0

Shortcodes 4

[attr_link] app\Attr4ce_Shortcode.php:25
[attr_master_tag] app\Attr4ce_Shortcode.php:26
[attr_action_sale] app\Attr4ce_Shortcode.php:27
[attr_action_lead] app\Attr4ce_Shortcode.php:28
WordPress Hooks 16
actionadmin_initapp\Attr4ce_Config.php:33
actionadmin_menuapp\Attr4ce_Config.php:34
actionadmin_initapp\Attr4ce_IntegrationConfigs.php:47
actionadmin_initapp\Attr4ce_IntegrationConfigs.php:48
actionadmin_noticesapp\Attr4ce_IntegrationConfigs.php:49
actionadmin_menuapp\Attr4ce_IntegrationConfigs.php:50
actionadmin_headapp\Attr4ce_IntegrationConfigs.php:51
actionwp_headapp\Attr4ce_Metatag.php:24
actionparse_requestapp\Attr4ce_RequestHandler.php:43
actionwoocommerce_add_to_cartapp\Attr4ce_ServerSideTracking.php:20
actionwpapp\Attr4ce_ServerSideTracking.php:21
actionshutdownapp\Attr4ce_ServerSideTracking.php:22
actionwoocommerce_thankyou_order_received_textapp\Attr4ce_WooCommerce.php:17
actionplugins_loadedattrace.php:27
actionplugins_loadedattrace.php:141
filterall_pluginsattrace.php:170
Maintenance & Trust

Attrace Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedDec 22, 2020
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Attrace Developer Profile

Roeland Werring

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Attrace

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/attrace/app/lib/attrace-connector-php/src/connector.js
Script Paths
/wp-content/plugins/attrace/app/lib/attrace-connector-php/src/connector.js
Version Parameters
attrace/style.css?ver=attrace/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
attrace-admin-wrapper
Data Attributes
name="attrace-site-verification"
JS Globals
attrace_data
Shortcode Output
<a href="/<a href="/<a href="/<a href="/
FAQ

Frequently Asked Questions about Attrace