
Hitsteps Web Analytics Security & Risk Analysis
wordpress.org/plugins/hitsteps-visitor-managerHitsteps Analytics is a real time website visitor tracker and SEO analytics, it allow you to view and interact with your visitors in real time.
Is Hitsteps Web Analytics Safe to Use in 2026?
Generally Safe
Score 99/100Hitsteps Web Analytics has a strong security track record. Known vulnerabilities have been patched promptly.
The hitsteps-visitor-manager plugin version 5.91 presents a mixed security posture. While it demonstrates good practices by utilizing prepared statements for all SQL queries and incorporating a reasonable number of capability checks (11) and nonce checks (3), there are significant areas of concern. The presence of two 'dangerous functions' (create_function) is a red flag, as this function is deprecated and known to be a source of vulnerabilities if not handled with extreme care. Furthermore, the static analysis reveals that a substantial percentage of output is not properly escaped (82%), indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. Taint analysis shows four flows with unsanitized paths, which, although not classified as critical or high, still represent potential avenues for malicious input to be processed without adequate sanitization.
The vulnerability history of this plugin is also a notable concern. With two known CVEs, both of medium severity, and previously involving Cross-Site Request Forgery (CSRF) and Cross-site Scripting (XSS), it suggests a pattern of susceptibility to common web application attacks. The fact that these vulnerabilities have existed in the past, even if currently patched, indicates a historical tendency for insecure coding practices. While there are no currently unpatched CVEs, the combination of historical vulnerabilities and high rates of unescaped output and unsanitized taint flows warrants caution.
In conclusion, the plugin has some strengths in SQL handling and authorization checks. However, the identified dangerous functions, the significant proportion of unescaped output, and the history of XSS and CSRF vulnerabilities point to a plugin that requires careful monitoring and potential remediation. The risk is moderate, primarily due to the potential for XSS and the historical context of past security flaws.
Key Concerns
- High percentage of unescaped output
- Taint analysis shows unsanitized paths
- Use of deprecated dangerous functions
- History of known CVEs (medium severity)
Hitsteps Web Analytics Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
Hitsteps Web Analytics <= 5.86 - Cross-Site Request Forgery via hst_optionpage
Hitsteps Web Analytics <= 5.86 - Authenticated (Administrator+) Stored Cross-Site Scripting
Hitsteps Web Analytics Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Hitsteps Web Analytics Attack Surface
WordPress Hooks 59
Maintenance & Trust
Hitsteps Web Analytics Maintenance & Trust
Maintenance Signals
Community Trust
Hitsteps Web Analytics Alternatives
Burst Statistics – Privacy-Friendly WordPress Analytics (Google Analytics Alternative)
burst-statistics
Analytics you'll actually use. Privacy-friendly, zero config, and designed to be actionable. Get insights, not just raw data.
HubSpot All-In-One Marketing – Forms, Popups, Live Chat
leadin
The CRM, Sales, and Marketing WordPress plugin to grow your business better. Capture and engage web visitors with free live chat, forms, CRM, email ma …
Statify
statify
Visitor statistics for WordPress with focus on data protection, transparency and clarity. Perfect as a widget in your WordPress Dashboard.
Koko Analytics – Privacy Friendly Statistics for WordPress
koko-analytics
Koko Analytics is a privacy-friendly statistics plugin for WordPress that is an easy to use alternative to Google Analytics.
Connect Matomo – Analytics Dashboard for WordPress
wp-piwik
Adds Matomo (former Piwik) statistics to your WordPress dashboard and is also able to add the Matomo Tracking Code to your blog.
Hitsteps Web Analytics Developer Profile
1 plugin · 900 total installs
How We Detect Hitsteps Web Analytics
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/hitsteps-visitor-manager/hitsteps.js/wp-content/plugins/hitsteps-visitor-manager/hitsteps.csshttps://edgecdnplus.com/codehitsteps-visitor-manager/hitsteps.css?ver=hitsteps-visitor-manager/hitsteps.js?ver=HTML / DOM Fingerprints
<!-- SNIPPET CODE<!-- TRACKING CODE<!-- Hitsteps tracking code not shown because you're an administrator and you've configured Hitsteps plugin to ignore administrators visits.hstc.srchstc.asynchstc.deferhtssc.parentNode.insertBeforeMySearch_hs_uniqueidipnameipnamesipemailsnochat+1 more