Gemius for WordPress Security & Risk Analysis

wordpress.org/plugins/gemius-for-wordpress

Simple implementation of the Gemius Audience tracking script.

20 active installs v1.2.2 PHP 7.0+ WP 5.0+ Updated Dec 3, 2025
gemius
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Gemius for WordPress Safe to Use in 2026?

Generally Safe

Score 100/100

Gemius for WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The gemius-for-wordpress plugin version 1.2.2 exhibits a seemingly strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface. Furthermore, the code signals indicate a complete absence of dangerous functions, file operations, external HTTP requests, and importantly, all SQL queries are using prepared statements, which is a critical best practice. Taint analysis revealing no unsanitized paths further reinforces this positive assessment.

However, a significant concern arises from the output escaping signals. With 3 total outputs and 0% properly escaped, there is a high probability of Cross-Site Scripting (XSS) vulnerabilities. This is a critical weakness that can be exploited to inject malicious scripts into the website, impacting users. The lack of any recorded vulnerability history might suggest a lack of past exploitation or discovery, but the identified output escaping issue presents a clear and present danger that should not be overlooked. The plugin adheres to secure data handling practices regarding SQL and avoids common entry points, but the output sanitization failure is a major oversight.

Key Concerns

  • Output escaping not implemented
Vulnerabilities
None known

Gemius for WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Gemius for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Gemius for WordPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_noticesgemius.php:94
actionadmin_initgemius.php:103
actionadmin_menugemius.php:104
actionwp_footergemius.php:133
Maintenance & Trust

Gemius for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 3, 2025
PHP min version7.0
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Alternatives

Gemius for WordPress Alternatives

No alternatives data available yet.

Developer Profile

Gemius for WordPress Developer Profile

TLA Media

3 plugins · 30K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
11 days
View full developer profile
Detection Fingerprints

How We Detect Gemius for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
gemius-for-wordpress/xlgemius.js

HTML / DOM Fingerprints

CSS Classes
gemius_warning
HTML Comments
Gemius Audience for WordPress by TLA Media - http://www.tlamedia.dk/End Gemius Audience for WordPress
JS Globals
pp_gemius_identifier
FAQ

Frequently Asked Questions about Gemius for WordPress