Awesome Tracker Security & Risk Analysis

wordpress.org/plugins/awesome-tracker

Track your users' navigation server-side. Also, you can track your WordPress API calls.

0 active installs v1.1.0 PHP 5.6+ WP 5.0+ Updated Dec 1, 2019
analyticstracking
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Awesome Tracker Safe to Use in 2026?

Generally Safe

Score 85/100

Awesome Tracker has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "awesome-tracker" plugin v1.1.0 exhibits a mixed security posture. On the positive side, the plugin has no recorded vulnerabilities (CVEs) and a relatively small attack surface with zero identified unprotected entry points like AJAX handlers, REST API routes, shortcodes, or cron events. The majority of its SQL queries (84%) are prepared, and it leverages bundled libraries like jQuery, which is common practice. However, there are notable areas of concern.

The static analysis reveals the presence of the dangerous `unserialize` function, which is a significant risk if the data being unserialized is not strictly controlled and sanitized. Furthermore, the taint analysis identified flows with unsanitized paths, including one of high severity, indicating potential issues where user-supplied input might be processed in an unsafe manner, potentially leading to path traversal or other file system vulnerabilities. The plugin also has a concerning 0% nonce checks, which are crucial for preventing CSRF attacks, especially if any of its (currently unlisted) internal operations could be triggered by user interaction. The output escaping is also only 59% properly escaped, leaving room for potential XSS vulnerabilities.

While the lack of historical CVEs is reassuring, it doesn't negate the risks identified in the current code. The presence of `unserialize` and high-severity taint flows, combined with a complete absence of nonce checks and suboptimal output escaping, suggests that the plugin is not following best security practices in several critical areas. Therefore, while the plugin appears to have a clean history, the code analysis reveals potential weaknesses that warrant attention and remediation to improve its overall security.

Key Concerns

  • Presence of 'unserialize' function
  • High severity taint flow identified
  • Flows with unsanitized paths
  • 0% nonce checks
  • Output escaping only 59% proper
  • File operations present
Vulnerabilities
None known

Awesome Tracker Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Awesome Tracker Code Analysis

Dangerous Functions
1
Raw SQL Queries
3
16 prepared
Unescaped Output
24
34 escaped
Nonce Checks
0
Capability Checks
2
File Operations
1
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

unserialize$this->$key = is_serialized($value) ? unserialize($value) : $value;inc\models\class-at-record.php:455

Bundled Libraries

jQuery

SQL Query Safety

84% prepared19 total queries

Output Escaping

59% escaped58 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

4 flows2 with unsanitized paths
search_box (inc\tables\class-wp-at-table.php:347)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Awesome Tracker Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionplugins_loadedawesome-tracker.php:74
actiontemplate_redirectinc\init\class-at-hooks.php:5
actionadmin_menuinc\init\class-at-hooks.php:7
actionadmin_menuinc\init\class-at-hooks.php:8
actionadmin_menuinc\init\class-at-hooks.php:9
actionadmin_menuinc\init\class-at-hooks.php:10
actionrest_api_initinc\init\class-at-hooks.php:12
actionplugins_loadedinc\init\class-at-hooks.php:17
filterrest_request_after_callbacksinc\init\class-at-hooks.php:21
actionadmin_footerinc\tables\class-wp-at-table.php:165
Maintenance & Trust

Awesome Tracker Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedDec 1, 2019
PHP min version5.6
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Awesome Tracker Developer Profile

Sergio Moreira

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Awesome Tracker

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/awesome-tracker/css/admin.css/wp-content/plugins/awesome-tracker/js/dist/blocks.build.js/wp-content/plugins/awesome-tracker/js/dist/blocks.editor.build.css/wp-content/plugins/awesome-tracker/js/external/chosen/chosen.jquery.min.js/wp-content/plugins/awesome-tracker/js/external/chosen/chosen.min.css/wp-content/plugins/awesome-tracker/js/admin.js
Script Paths
/wp-content/plugins/awesome-tracker/js/dist/blocks.build.js/wp-content/plugins/awesome-tracker/js/admin.js/wp-content/plugins/awesome-tracker/js/external/chosen/chosen.jquery.min.js
Version Parameters
awesome-tracker/css/admin.css?ver=awesome-tracker/js/dist/blocks.build.js?ver=awesome-tracker/js/dist/blocks.editor.build.css?ver=awesome-tracker/js/external/chosen/chosen.jquery.min.js?ver=awesome-tracker/js/external/chosen/chosen.min.css?ver=awesome-tracker/js/admin.js?ver=

HTML / DOM Fingerprints

JS Globals
window.atGlobalwindow.atRoutesGlobalwindow.atSettingsGlobalwindow.ati18n
REST Endpoints
/wp-json/awesome-tracker
FAQ

Frequently Asked Questions about Awesome Tracker