COVID19TRACKER Security & Risk Analysis

wordpress.org/plugins/covid19-real-time-tracker

COVID19TRACKER displays real time covid19 data on your widget, using the lmao.ninja API. IMPORTANT: This plugin relays on an external service by send …

10 active installs v1.0.0 PHP 5.2.4+ WP 4.6+ Updated Mar 23, 2020
coronacorona-viruscovid19widget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is COVID19TRACKER Safe to Use in 2026?

Generally Safe

Score 85/100

COVID19TRACKER has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "covid19-real-time-tracker" v1.0.0 plugin exhibits a generally positive security posture based on the provided static analysis. The absence of any identified CVEs, both historically and currently, along with a clean taint analysis, suggests a low likelihood of known, exploitable vulnerabilities. The code also demonstrates good practices in its handling of SQL queries, utilizing prepared statements exclusively, and avoiding file operations. However, there are notable areas of concern. The plugin has a low number of identified output escaping points (32), with a significant portion (53%) not being properly escaped. This leaves it vulnerable to Cross-Site Scripting (XSS) attacks if any user-supplied data is ever rendered directly to the browser without proper sanitization. Furthermore, the complete lack of nonce checks and capability checks, coupled with an absence of protected entry points in AJAX, REST API, and shortcodes, creates a broad attack surface that could be exploited if any new functionality is added without these crucial security layers. The two external HTTP requests also represent potential vectors for man-in-the-middle attacks or server-side request forgery (SSRF) if not handled with extreme care and validation.

Key Concerns

  • Low output escaping rate
  • No nonce checks
  • No capability checks
  • External HTTP requests
Vulnerabilities
None known

COVID19TRACKER Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

COVID19TRACKER Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
17 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

53% escaped32 total outputs
Attack Surface

COVID19TRACKER Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initcovid19tracking.php:387
Maintenance & Trust

COVID19TRACKER Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedMar 23, 2020
PHP min version5.2.4
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

COVID19TRACKER Developer Profile

ehudettun

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect COVID19TRACKER

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/covid19-real-time-tracker/css/style.css/wp-content/plugins/covid19-real-time-tracker/js/script.js
Version Parameters
covid19-real-time-tracker/css/style.css?ver=covid19-real-time-tracker/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
covid19-tracker-widget-titlecovid19-tracker-country-datacovid19-tracker-worldwide-data
Data Attributes
data-countrydata-show-worldwide
Shortcode Output
[covid19_tracker][covid19_tracker country="US" show_worldwide="true"]
FAQ

Frequently Asked Questions about COVID19TRACKER