AWStats Script Security & Risk Analysis

wordpress.org/plugins/awstats-script

Adds the HTML script tag and JS code that AWStats requires to enable collection of browser data like screen size and browser capabilities.

30 active installs v0.3 PHP + WP 2.2+ Updated Jul 1, 2008
awstats
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is AWStats Script Safe to Use in 2026?

Generally Safe

Score 85/100

AWStats Script has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The 'awstats-script' plugin v0.3 exhibits a generally strong security posture based on the static analysis and vulnerability history provided. The absence of known CVEs and a lack of critical or high-severity issues in its history are positive indicators. Furthermore, the plugin demonstrates good security practices by utilizing prepared statements for all SQL queries and including nonce and capability checks. The attack surface is reported as zero, with no AJAX handlers, REST API routes, shortcodes, or cron events, which significantly reduces potential entry points for attackers.

However, a significant concern arises from the output escaping analysis. With 100% of its 12 outputs not properly escaped, the plugin presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is rendered on a page without proper sanitization could be exploited. While taint analysis showed no unsanitized paths, this is limited by the scope of the analysis and does not negate the direct finding of unescaped output.

In conclusion, while the plugin has a clean vulnerability history and good defensive coding practices in place for data handling and access control, the lack of output escaping is a critical weakness that needs immediate attention. This single oversight could undermine the otherwise robust security measures implemented. Addressing the unescaped output is paramount to mitigating the risk of XSS attacks.

Key Concerns

  • Output not properly escaped
Vulnerabilities
None known

AWStats Script Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

AWStats Script Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
0 escaped
Nonce Checks
1
Capability Checks
1
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped12 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
aws_options_page (awstats-script.php:99)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

AWStats Script Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuawstats-script.php:55
actionwp_footerawstats-script.php:239
actionwp_headawstats-script.php:241
Maintenance & Trust

AWStats Script Maintenance & Trust

Maintenance Signals

WordPress version tested2.5.1
Last updatedJul 1, 2008
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs30
Developer Profile

AWStats Script Developer Profile

Jorge Garcia de Bustos

2 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AWStats Script

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/awstats-script/js/awstats_misc_tracker.js

HTML / DOM Fingerprints

HTML Comments
<!-- AWStats Script tracking code -->
JS Globals
awstatsmisctrackerurl
FAQ

Frequently Asked Questions about AWStats Script