CellarWeb Server Side Analytics Security & Risk Analysis

wordpress.org/plugins/cellarweb-server-side-analytics

Allows using Google Analytics via server-side request. Many ad blockers block client-side Google Analytics, resulting in incomplete values.

10 active installs v1.02 PHP 7.2+ WP 4.9.6+ Updated Apr 6, 2023
gdprgoogle-analyticsprivacy
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CellarWeb Server Side Analytics Safe to Use in 2026?

Generally Safe

Score 85/100

CellarWeb Server Side Analytics has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The plugin "cellarweb-server-side-analytics" v1.02 exhibits a generally strong security posture based on the static analysis. The absence of detectable attack surface points like AJAX handlers, REST API routes, shortcodes, and cron events is a significant positive. Furthermore, the complete absence of dangerous functions and raw SQL queries, with all SQL queries utilizing prepared statements, indicates good development practices in these critical areas.

However, a notable concern arises from the output escaping. Only 6% of the 18 total outputs are properly escaped, leaving a substantial portion potentially vulnerable to Cross-Site Scripting (XSS) attacks. While taint analysis found no critical or high severity flows, this low output escaping rate could still lead to issues if user-supplied data is directly reflected in the output without sanitization.

The plugin's vulnerability history is clean, with no recorded CVEs. This suggests either a history of secure development or that the plugin may not have been subjected to extensive public vulnerability discovery. Despite the lack of direct vulnerabilities found in taint analysis, the poor output escaping remains a clear weakness that could be exploited.

Key Concerns

  • Low output escaping rate
Vulnerabilities
None known

CellarWeb Server Side Analytics Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

CellarWeb Server Side Analytics Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
1 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

6% escaped18 total outputs
Attack Surface

CellarWeb Server Side Analytics Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_initserver-side-analytics.php:43
actionadmin_noticesserver-side-analytics.php:44
actionnetwork_admin_initserver-side-analytics.php:45
actionnetwork_admin_noticesserver-side-analytics.php:46
actionwp_footerserver-side-analytics.php:52
actionadmin_menuserver-side-analytics.php:75
actionadmin_initserver-side-analytics.php:76
Maintenance & Trust

CellarWeb Server Side Analytics Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedApr 6, 2023
PHP min version7.2
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

CellarWeb Server Side Analytics Developer Profile

Rick Hellewell

16 plugins · 1K total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CellarWeb Server Side Analytics

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cellarweb-server-side-analytics/css/settings.css
Version Parameters
cellarweb-server-side-analytics/css/settings.css?ver=

HTML / DOM Fingerprints

CSS Classes
CWSSA_optionsCWSSA_shadowCWSSA_header
Data Attributes
data-gacodedata-trackingdata-gaid
JS Globals
CWSSA_GA_ID_numberCWSSA_tracking
FAQ

Frequently Asked Questions about CellarWeb Server Side Analytics