GA Code Visibility Security & Risk Analysis

wordpress.org/plugins/ga-code-visibility

Easily add Google Analytics code to your head and use it only when site is switched to "Search Engine Visibility".

10 active installs v0.4 PHP + WP 3.0.1+ Updated Mar 10, 2021
add-to-headheadhead-codeheaderheader-code
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is GA Code Visibility Safe to Use in 2026?

Generally Safe

Score 85/100

GA Code Visibility has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The static analysis of 'ga-code-visibility' v0.4 reveals a plugin with a seemingly minimal attack surface. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, and therefore no unprotected entry points. The code also avoids dangerous functions, file operations, and external HTTP requests. Furthermore, all SQL queries are confirmed to use prepared statements, which is a strong security practice.

However, a significant concern arises from the complete lack of output escaping, with 100% of identified outputs being unescaped. This indicates a potential for Cross-Site Scripting (XSS) vulnerabilities if any user-supplied data is ever reflected directly in the output without proper sanitization. The absence of nonce checks and capability checks across all entry points is also a weakness, as it means any authenticated user could potentially trigger actions within the plugin, even if those actions were intended for administrators.

The plugin's vulnerability history is clean, with no known CVEs or past vulnerabilities. This suggests a good track record, but it does not negate the inherent risks identified in the current code. In conclusion, while the plugin demonstrates strengths in avoiding common pitfalls like raw SQL and external requests, the critical lack of output escaping and insufficient authorization checks present notable security risks.

Key Concerns

  • Outputs are not properly escaped
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

GA Code Visibility Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

GA Code Visibility Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

GA Code Visibility Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filteradmin_initga_add.php:27
actionadmin_footerga_add.php:48
actionwp_headga_add.php:62
Maintenance & Trust

GA Code Visibility Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedMar 10, 2021
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

GA Code Visibility Developer Profile

Off Site Services

2 plugins · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GA Code Visibility

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ga-code-visibility/js/ga-plugin.js
Script Paths
/wp-content/plugins/ga-code-visibility/js/ga-plugin.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about GA Code Visibility