GoStats for WordPress Security & Risk Analysis

wordpress.org/plugins/gostats-for-wordpress

Insert GoStats Analytics into your Blog. Often used alongside other widgets for an even better understanding of how your site is used. Includes Map.

20 active installs v1.4 PHP + WP 2.0.2+ Updated Dec 15, 2015
analyticsgostatshit-countersite-statsstats
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GoStats for WordPress Safe to Use in 2026?

Generally Safe

Score 85/100

GoStats for WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The gostats-for-wordpress plugin, version 1.4, exhibits a mixed security posture. On the positive side, the plugin demonstrates excellent practices regarding database interactions, utilizing prepared statements exclusively and showing no file operations or external HTTP requests. Furthermore, there is no recorded vulnerability history, suggesting a relatively stable codebase. However, a significant concern arises from the static analysis, where 100% of the observed output operations are not properly escaped. This presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data displayed on the frontend could be manipulated to inject malicious scripts.

The taint analysis indicates two flows with unsanitized paths, which, while not classified as critical or high severity in this instance, warrant attention. These flows, combined with the lack of output escaping, could potentially be chained with other vectors to exploit vulnerabilities. The absence of AJAX handlers, REST API routes, shortcodes, and cron events from the attack surface is a positive indicator, reducing the plugin's immediate exposure. However, the critical lack of output escaping significantly undermines the overall security, making it a primary area of concern that needs immediate remediation.

Key Concerns

  • 100% of output not properly escaped
  • Taint flow with unsanitized path
  • Second taint flow with unsanitized path
Vulnerabilities
None known

GoStats for WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

GoStats for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped15 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
gostats_manage (GoStats.php:24)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

GoStats for WordPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionplugins_loadedGoStats.map.widget.php:38
actionadmin_menuGoStats.php:14
actionwp_footerGoStats.php:105
Maintenance & Trust

GoStats for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedDec 15, 2015
PHP min version
Downloads36K

Community Trust

Rating100/100
Number of ratings3
Active installs20
Developer Profile

GoStats for WordPress Developer Profile

rchmura

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GoStats for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gostats-for-wordpress/js/counter.wp.js/wp-content/plugins/gostats-for-wordpress/js/clickmap/clickmap.js
Script Paths
//gostats.com/js/counter.wp.js//gostats.com/js/clickmap/clickmap.js

HTML / DOM Fingerprints

CSS Classes
gostats-code-for-wordpress-target
HTML Comments
<!-- GoStats.com --><!-- GoStats JavaScript Based Code --><!-- End GoStats JavaScript Based Code -->
Data Attributes
id="gostats-code-for-wordpress-target"
JS Globals
_gos_goa_got_goi_gol
FAQ

Frequently Asked Questions about GoStats for WordPress