Conversion And Remarketing Code Security & Risk Analysis

wordpress.org/plugins/conversion-and-remarketing-code

Easily place tracking code in the header or footer of your entire site or individual posts/pages.

100 active installs v1.0.1 PHP + WP 2.7+ Updated Jul 23, 2015
adwordsconversion-codefacebook-adsfacebook-remarketingremarketing
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Conversion And Remarketing Code Safe to Use in 2026?

Generally Safe

Score 85/100

Conversion And Remarketing Code has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "conversion-and-remarketing-code" plugin v1.0.1 exhibits a generally strong security posture based on the static analysis. The absence of any identified attack surface entry points, dangerous functions, or external HTTP requests is a significant positive. Furthermore, the adherence to prepared statements for all SQL queries and the presence of nonce and capability checks indicate good development practices in handling sensitive operations. The lack of known CVEs and a history of vulnerabilities further reinforces this positive assessment.

However, a critical area of concern arises from the output escaping. With only 25% of outputs properly escaped, there's a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that is not properly sanitized could be exploited. The taint analysis showing zero flows is positive, but it's important to note that the scope of this analysis might be limited if there were no identifiable entry points to trace from. The low percentage of properly escaped output is the most prominent weakness.

In conclusion, while the plugin demonstrates several strong security fundamentals, particularly in its handling of SQL and access control, the high proportion of unescaped output presents a notable risk. This weakness, if exploited, could lead to XSS attacks. Addressing the output escaping is paramount to improving its overall security. The vulnerability history is excellent, but the code analysis reveals a specific, addressable risk.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Conversion And Remarketing Code Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Conversion And Remarketing Code Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Conversion And Remarketing Code Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
4 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

25% escaped16 total outputs
Attack Surface

Conversion And Remarketing Code Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwp_headconversion-and-remarketing.php:54
actionwp_footerconversion-and-remarketing.php:55
actionadd_meta_boxesconversion-and-remarketing.php:105
actionsave_postconversion-and-remarketing.php:106
Maintenance & Trust

Conversion And Remarketing Code Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedJul 23, 2015
PHP min version
Downloads13K

Community Trust

Rating88/100
Number of ratings5
Active installs100
Developer Profile

Conversion And Remarketing Code Developer Profile

neeaagh

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Conversion And Remarketing Code

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
widefat
Data Attributes
script-header-textscript-footer-text
FAQ

Frequently Asked Questions about Conversion And Remarketing Code