Freespee Call Tracking Security & Risk Analysis

wordpress.org/plugins/freespee-call-tracking

See which visitors ended up calling you, no coding required. Automated delivery of phone call data to your Google Analytics account.

10 active installs v1.0 PHP + WP 3.0+ Updated Apr 21, 2015
adwordsanalyticscall-trackingconversion-trackingfreespee
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Freespee Call Tracking Safe to Use in 2026?

Generally Safe

Score 85/100

Freespee Call Tracking has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The freespee-call-tracking plugin v1.0 exhibits a generally positive security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code signals indicate no dangerous functions, no raw SQL queries, no file operations, and no external HTTP requests, all of which are strong security indicators. The use of prepared statements for any SQL queries would also be a positive sign, although none were detected in this analysis.

However, a significant concern arises from the output escaping. With one total output and 0% properly escaped, there is a high likelihood of Cross-Site Scripting (XSS) vulnerabilities if any user-supplied data is displayed without proper sanitization. The presence of a capability check is good, but its effectiveness cannot be fully determined without knowing what it protects. The lack of nonce checks, while not a direct vulnerability in itself given the limited attack surface, could become a risk if new entry points are added in future versions without them.

The vulnerability history is completely clean, with no recorded CVEs. This suggests either a well-developed and secure plugin or that it has not been a target for significant security research or exploitation. While this is reassuring, it's important to remember that a clean history doesn't guarantee future security, especially when combined with potential weaknesses like the unescaped output.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

Freespee Call Tracking Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Freespee Call Tracking Release Timeline

v1.0Current
Code Analysis
Analyzed Mar 17, 2026

Freespee Call Tracking Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Freespee Call Tracking Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initfreespee_call_tracking.php:55
actionadmin_menufreespee_call_tracking.php:56
actionadmin_noticesfreespee_call_tracking.php:57
actionwp_print_scriptsfreespee_call_tracking.php:60
actionwp_enqueue_scriptsfreespee_call_tracking.php:61
Maintenance & Trust

Freespee Call Tracking Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedApr 21, 2015
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Freespee Call Tracking Developer Profile

Tobias Lindgren

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Freespee Call Tracking

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/freespee-call-tracking/templates/fs_conf_js.php/wp-content/plugins/freespee-call-tracking/templates/notify_banner.php/wp-content/plugins/freespee-call-tracking/templates/settings.php
Script Paths
//analytics.freespee.com/js/external/fs.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Freespee Call Tracking