ECT Sitemap Security & Risk Analysis

wordpress.org/plugins/ect-sitemap

Add a sitemap to your WordPress integrated Ecommerce Templates shopping cart software site.

10 active installs v2.0 PHP + WP + Updated Unknown
ecommerceonline-storesell-productsshopping-cartwordpress-ecommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is ECT Sitemap Safe to Use in 2026?

Generally Safe

Score 100/100

ECT Sitemap has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The ect-sitemap plugin version 2.0 presents a mixed security picture. On the positive side, it has no known vulnerabilities (CVEs) and a relatively small attack surface with only one shortcode entry point, which is not explicitly stated as unprotected in the provided metrics. The absence of external HTTP requests and critical taint flows are also good indicators of a secure implementation in those areas.

However, significant concerns arise from the code analysis. The plugin exhibits poor output escaping practices, with only 14% of outputs being properly escaped. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, especially given that there are no explicit nonce or capability checks present, leaving the shortcode potentially vulnerable to unauthenticated or privileged user attacks. Furthermore, the high percentage of SQL queries not using prepared statements (60%) introduces a risk of SQL injection vulnerabilities. The taint analysis, while limited in scope, did identify flows with unsanitized paths, which, if exploitable in conjunction with the other weaknesses, could be serious.

In conclusion, while the plugin has a clean vulnerability history and no external dependencies, the observed lack of robust input validation (especially for the shortcode) and secure coding practices for SQL and output handling create notable security weaknesses. The plugin's strengths lie in its limited attack surface and lack of known exploits, but these are overshadowed by the potential for XSS and SQL injection due to inadequate sanitization and escaping.

Key Concerns

  • High percentage of unsanitized output
  • High percentage of raw SQL queries
  • No nonce checks
  • No capability checks
  • Unsanitized paths in taint flows
Vulnerabilities
None known

ECT Sitemap Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

ECT Sitemap Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
2 prepared
Unescaped Output
6
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

SQL Query Safety

40% prepared5 total queries

Output Escaping

14% escaped7 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
ect_sitemap_fun (ect-sitemap.php:31)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

ECT Sitemap Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[ECT_HTML_SITEMAP] ect-sitemap.php:140
WordPress Hooks 3
actionadmin_menuect-sitemap.php:25
actionwp_footerect-sitemap.php:116
actioninitect-sitemap.php:121
Maintenance & Trust

ECT Sitemap Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

ECT Sitemap Developer Profile

etemplates

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ECT Sitemap

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ect-sitemap/css/style.css

HTML / DOM Fingerprints

CSS Classes
admin_innerect_smect_sm_subheader-txt
Shortcode Output
[ECT_HTML_SITEMAP]
FAQ

Frequently Asked Questions about ECT Sitemap