Simple Tag Manager Security & Risk Analysis

wordpress.org/plugins/ignite-online-google-tag-manager

Easily deploy your Google Tag Manager, Facebook Tracking Pixel, Hotjar or Hubspot tracking codes.

0 active installs v1.0.0 PHP 5.4+ WP 4.7+ Updated Jun 27, 2018
analyticsfacebookhubspotignitetag-manager
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple Tag Manager Safe to Use in 2026?

Generally Safe

Score 85/100

Simple Tag Manager has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "ignite-online-google-tag-manager" v1.0.0 plugin exhibits a strong security posture in several key areas, notably the complete absence of known CVEs and no identified taint flows or dangerous functions. The code also demonstrates good practice by exclusively using prepared statements for all SQL queries and having no file operations or external HTTP requests, which significantly reduces common attack vectors.

However, a significant concern arises from the output escaping analysis, which indicates that 0% of the 14 total outputs are properly escaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is ever rendered directly in the output without proper sanitization. Furthermore, the lack of nonce and capability checks across all entry points, coupled with an absence of explicit AJAX handlers or REST API routes with permission callbacks, suggests a potential for privilege escalation or unauthorized actions if the plugin's functionality were to be invoked in an unexpected context, though the limited attack surface might mitigate this.

In conclusion, while the plugin benefits from a clean vulnerability history and secure handling of database interactions and external communications, the complete lack of output escaping and the absence of robust authorization checks on potential entry points present a notable security weakness. These areas require immediate attention to prevent potential XSS and other injection-based attacks.

Key Concerns

  • 0% of outputs properly escaped
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Simple Tag Manager Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Simple Tag Manager Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped14 total outputs
Attack Surface

Simple Tag Manager Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionafter_setup_themeignite-tm.php:24
actionafter_setup_themeignite-tm.php:40
actionadmin_menuignite-tm.php:42
actionadmin_initignite-tm.php:46
Maintenance & Trust

Simple Tag Manager Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJun 27, 2018
PHP min version5.4
Downloads1K

Community Trust

Rating20/100
Number of ratings1
Active installs0
Developer Profile

Simple Tag Manager Developer Profile

IGNITE®

3 plugins · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Tag Manager

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ignite-online-google-tag-manager/modules/
Script Paths
https://connect.facebook.net/en_US/fbevents.js//static.hotjar.co

HTML / DOM Fingerprints

HTML Comments
<!-- Facebook Pixel Code--><!-- End Facebook Pixel Code --><!-- Google Tag Manager --><!-- End Google Tag Manager -->+1 more
Data Attributes
data-name="Layer 2"data-name="Layer 1"
JS Globals
fbqhj
FAQ

Frequently Asked Questions about Simple Tag Manager