Clixtell Security & Risk Analysis
wordpress.org/plugins/clixtell-tracking-dynamic-phonesClixtell Tracking & Dynamic Phones integrates Clixtell click fraud detection and dynamic phone number insertion into your WordPress site.
Is Clixtell Safe to Use in 2026?
Generally Safe
Score 100/100Clixtell has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The static analysis of the "clixtell-tracking-dynamic-phones" v2.4 plugin reveals a generally positive security posture. The plugin has a minimal attack surface, with no discovered AJAX handlers, REST API routes, shortcodes, or cron events that are exposed. Furthermore, the code signals indicate a lack of dangerous functions, no raw SQL queries (all use prepared statements), no file operations, and no external HTTP requests. The presence of capability checks is also a good sign. However, there are a couple of areas for improvement. Notably, 25% of output operations are not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if the data being output is user-controlled or originates from an untrusted source. Additionally, the lack of nonce checks, while not directly flagged as a risk given the zero entry points, could become a concern if any entry points were to be introduced in future versions without proper sanitization.
The vulnerability history for this plugin is exceptionally clean, with no recorded CVEs of any severity. This pattern of no past vulnerabilities, combined with the current code analysis, suggests a development team that is either very security-conscious or the plugin is relatively new and has not yet been extensively targeted or analyzed. The strength of this plugin lies in its limited attack surface and secure handling of database operations. The primary weakness identified is the imperfect output escaping, which presents a potential XSS risk. Despite this, the overall risk is assessed as low given the absence of critical vulnerabilities in the code analysis and a clean historical record.
Key Concerns
- Unescaped output found
- No nonce checks present
Clixtell Security Vulnerabilities
Clixtell Code Analysis
Output Escaping
Clixtell Attack Surface
WordPress Hooks 4
Maintenance & Trust
Clixtell Maintenance & Trust
Maintenance Signals
Community Trust
Clixtell Alternatives
INVOX Call Tracking
invox-call-tracking
The INVOX Call Tracking plugin lets WordPress users easily add Dynamic Number Insertion (DNI) to their site without technical or coding skills.
CallRail Phone Call Tracking
callrail-phone-call-tracking
Dynamically swap CallRail tracking phone numbers based on the visitor's referring source.
WhatConverts
whatconverts
Enables WhatConverts on all pages.
CallTrackingMetrics
call-tracking-metrics
CallTrackingMetrics integrates with your WordPress site to provide powerful call tracking and attribution.
LocaliQ – Tracking Code
reachedge
Adds LocaliQ's tracking code on all pages.
Clixtell Developer Profile
1 plugin · 1K total installs
How We Detect Clixtell
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/clixtell-tracking-dynamic-phones/dynamicphones.js/wp-content/plugins/clixtell-tracking-dynamic-phones/track.jshttps://app.clixtell.com/scripts/dynamicphones.jshttps://scripts.clixtell.com/track.jsclixtell-dynamic-phones/dynamicphones.js?ver=2.4clixtell-tracking/track.js?ver=2.4HTML / DOM Fingerprints
clixtell_plugin_version