
fullstory WordPress reference integration Security & Risk Analysis
wordpress.org/plugins/cd2-fullstory-integrationThis plugin enables painless integration with WordPress (including WooCommerce) with the fullstory user-monitoring platform.
Is fullstory WordPress reference integration Safe to Use in 2026?
Generally Safe
Score 100/100fullstory WordPress reference integration has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The static analysis of "cd2-fullstory-integration" v1.09 reveals a generally strong security posture based on the absence of identified vulnerabilities in its history and the lack of critical findings in the static and taint analyses. The plugin demonstrates good practices by not exposing any obvious entry points like AJAX handlers, REST API routes, or shortcodes without authentication, and it utilizes prepared statements for its SQL queries. However, there are some areas of concern. The extremely low percentage of properly escaped output (9%) suggests a significant risk of Cross-Site Scripting (XSS) vulnerabilities, especially given the absence of explicit taint analysis results which might have missed these flows. Furthermore, the lack of nonce and capability checks across any potential entry points (even though none were identified) is a notable weakness, leaving the plugin vulnerable if new entry points were introduced or if the static analysis was incomplete.
While the vulnerability history is clean, indicating a potentially well-maintained plugin, the limited static analysis data, particularly the low output escaping percentage and the absence of taint flow details, prevents a definitive conclusion about its overall security. The plugin appears to have a minimal attack surface, which is a positive sign. However, the identified output escaping issue is a significant concern that could lead to vulnerabilities. The lack of explicit authentication and authorization checks on potential entry points, even if none were found, also warrants caution. Overall, the plugin exhibits some good security practices but has a critical deficiency in output escaping that needs to be addressed.
Key Concerns
- Low output escaping percentage
- No nonce checks
- No capability checks
fullstory WordPress reference integration Security Vulnerabilities
fullstory WordPress reference integration Release Timeline
fullstory WordPress reference integration Code Analysis
Output Escaping
fullstory WordPress reference integration Attack Surface
WordPress Hooks 4
Maintenance & Trust
fullstory WordPress reference integration Maintenance & Trust
Maintenance Signals
Community Trust
fullstory WordPress reference integration Alternatives
Tada: Instant Webpage Loading, Fast Website Browsing
tada
Make your website load more quickly.
ShopMagic for Google Sheets
shopmagic-for-google-sheets
Integrate your WooCommerce store with Google Sheets - the most popular Spreadsheet service for free.
Button It Up
button-it-up
Button It Up changes the upload/insert button style to look like an actual button.
Twitter SP2
twitter-sp2
A Wordpress plugin that posts on Twitter a link to your post shorten via sp2.ro when you publish a blog post.
UX Tracker
ux-tracker
UX Tracker will allow you track and analyse your sites users behaviour with tools such as Google Analytics, Inspectlet, ScrollDepth and TrackAnything.
fullstory WordPress reference integration Developer Profile
2 plugins · 320 total installs
How We Detect fullstory WordPress reference integration
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/cd2-fullstory-integration/js/fs-snippet.js/wp-content/plugins/cd2-fullstory-integration/js/admin.js/wp-content/plugins/cd2-fullstory-integration/js/admin.jsHTML / DOM Fingerprints
<!-- FullStory WP Integration -->window['_fs_debug']window['_fs_org']FS.identifyFS.consent