Hotjar Security & Risk Analysis

wordpress.org/plugins/hotjar

The fast & visual way to understand your users.

70K active installs v1.0.16 PHP + WP 4.6+ Updated Oct 25, 2023
heatmapshotjarinsightsrecordingsvisual
85
A · Safe
CVEs total1
Unpatched0
Last CVEOct 5, 2023
Download
Safety Verdict

Is Hotjar Safe to Use in 2026?

Generally Safe

Score 85/100

Hotjar has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Oct 5, 2023Updated 2yr ago
Risk Assessment

The Hotjar plugin version 1.0.16 presents a generally positive security posture based on the static analysis provided. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points is a significant strength, indicating a limited attack surface. The use of prepared statements for all SQL queries and the absence of file operations and external HTTP requests are also good security practices. However, the static analysis also reveals a concerning weakness: 60% of output escaping is missing. This means that a significant portion of data being displayed to users may not be properly sanitized, creating a potential vulnerability for Cross-Site Scripting (XSS) attacks.

The plugin's vulnerability history, while showing only one medium-severity CVE, is still a point of concern. The common vulnerability type listed is 'Cross-site Scripting', which directly aligns with the observed unescaped output in the static analysis. The fact that this vulnerability was relatively recent (October 2023) and was a medium severity suggests that while the developers are addressing vulnerabilities, there's an ongoing risk related to input handling and output sanitization. The lack of critical or high severity CVEs is a positive sign, but the pattern of XSS vulnerabilities warrants attention.

In conclusion, the Hotjar plugin exhibits strengths in its limited attack surface and secure database practices. However, the significant percentage of unescaped output and the historical pattern of XSS vulnerabilities are notable weaknesses that elevate the risk. While there are no unpatched CVEs currently, the identified code signals and historical data suggest a need for further review and improvement in output sanitization to mitigate potential XSS risks.

Key Concerns

  • Significant unescaped output (60%)
  • 1 medium severity CVE in history
  • Vulnerability history indicates XSS risk
Vulnerabilities
1 published

Hotjar Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2023-1259medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Hotjar <= 1.0.15 - Authenticated (Administrator+) Stored Cross-Site Scripting

Oct 5, 2023 Patched in 1.0.16 (110d)
Version History

Hotjar Release Timeline

v1.0.16Current
v1.0.151 CVE
v1.0.141 CVE
v1.0.131 CVE
v1.0.121 CVE
v1.0.101 CVE
v1.0.91 CVE
v1.0.81 CVE
v1.0.71 CVE
v1.0.61 CVE
v1.0.51 CVE
v1.0.41 CVE
v1.0.31 CVE
v1.0.21 CVE
v1.0.11 CVE
v1.0.01 CVE
Code Analysis
Analyzed Mar 16, 2026

Hotjar Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

40% escaped10 total outputs
Attack Surface

Hotjar Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedhotjar.php:19
actionadmin_inithotjar.php:57
actionadmin_menuincludes\class-hotjar.php:22
actionwp_headincludes\class-hotjar.php:68
actionadmin_enqueue_scriptsincludes\class-hotjar.php:72
Maintenance & Trust

Hotjar Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedOct 25, 2023
PHP min version
Downloads1.1M

Community Trust

Rating58/100
Number of ratings18
Active installs70K
Developer Profile

Hotjar Developer Profile

Hotjar

1 plugin · 70K total installs

69
trust score
Avg Security Score
85/100
Avg Patch Time
110 days
View full developer profile
Detection Fingerprints

How We Detect Hotjar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hotjar/admin/static/hotjar-admin.css

HTML / DOM Fingerprints

JS Globals
hj_hjSettings
FAQ

Frequently Asked Questions about Hotjar