GTM+ WordPress Security & Risk Analysis

wordpress.org/plugins/gtmpluswp

This plugin easily places the Google Tag Manager container code onto your WordPress website, so you do not have to worry about a manual installation.

40 active installs v1.0.1 PHP 5.4+ WP 4.3.0+ Updated Aug 1, 2019
google-tag-managergtmtag-containertag-management
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is GTM+ WordPress Safe to Use in 2026?

Generally Safe

Score 85/100

GTM+ WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The gtmpluswp plugin, version 1.0.1, exhibits a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries and avoiding external HTTP requests. The absence of known vulnerabilities in its history is also a strong indicator of stable development. However, significant concerns arise from its attack surface and code analysis. The plugin exposes one REST API route without any permission callbacks, creating a direct entry point for potential unauthorized actions. Furthermore, the taint analysis reveals three flows with unsanitized paths, although these are not categorized as critical or high severity. This indicates a potential for unintended data handling if these paths are triggered with malicious input, even if the immediate impact is not severe. The lack of nonce checks and capability checks on the identified entry points exacerbates these risks, as there are no built-in mechanisms to verify user intent or authorization before processing requests.

Key Concerns

  • Unprotected REST API route
  • Flows with unsanitized paths
  • No capability checks
  • Output escaping not fully implemented
Vulnerabilities
None known

GTM+ WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

GTM+ WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
13
27 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
1

Bundled Libraries

Guzzle

Output Escaping

68% escaped40 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
input_id (gtm4wordpress.php:222)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

GTM+ WordPress Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

POST/wp-json/gtm4wp/account_data/gtm4wordpress.php:192
WordPress Hooks 8
actionadmin_initgtm4wordpress.php:30
actionrest_api_initgtm4wordpress.php:191
actionadmin_footergtm4wordpress.php:257
actionadmin_menugtm4wordpress.php:322
actionadmin_noticesgtm4wordpress.php:345
actionadmin_noticesgtm4wordpress.php:394
actionwp_headgtm4wordpress.php:456
actionwp_footergtm4wordpress.php:549
Maintenance & Trust

GTM+ WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedAug 1, 2019
PHP min version5.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

GTM+ WordPress Developer Profile

Mark-k

7 plugins · 2K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GTM+ WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
gtm4wordpress/gtm4wordpress.php?ver=

HTML / DOM Fingerprints

Data Attributes
name="gtm4wordpress[layer_type]"name="gtm4wordpress[layer_categories]"name="gtm4wordpress[layer_tags]"name="gtm4wordpress[layer_author_id]"name="gtm4wordpress[layer_author_name]"name="gtm4wordpress[layer_date]"+4 more
JS Globals
window.gtm4wordpress
REST Endpoints
/wp-json/gtm4wp/account_data/
FAQ

Frequently Asked Questions about GTM+ WordPress