Invisible Optin Security & Risk Analysis

wordpress.org/plugins/invisible-optin

Facebook's ReTargeting Plugin for WordPress. Use this Plugin to Add Facebook's ReTargeting Pixels in your WordPress Website.

90 active installs v1.0 PHP + WP 3.0.1+ Updated Jan 27, 2015
adscustom-audiencefacebookre-marketingre-targeting
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEAug 25, 2025
Safety Verdict

Is Invisible Optin Safe to Use in 2026?

Use With Caution

Score 63/100

Invisible Optin has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Aug 25, 2025Updated 11yr ago
Risk Assessment

The 'invisible-optin' v1.0 plugin presents a mixed security posture. On the positive side, static analysis reveals a limited attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events directly exposed without authentication. The plugin also avoids using dangerous functions, file operations, and external HTTP requests, and doesn't bundle external libraries. However, significant concerns arise from the lack of output escaping, as 0% of outputs are properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. While there are no critical or high severity taint flows identified, the presence of two flows with unsanitized paths is still a red flag. The vulnerability history is particularly concerning, with one unpatched medium severity CVE related to Cross-Site Request Forgery (CSRF) from August 25, 2025. This indicates a historical weakness in handling user input and potential for unauthorized actions.

Despite the lack of immediate critical vulnerabilities in the current code scan, the combination of unescaped output, unsanitized paths in taint analysis, and a past CSRF vulnerability suggests a plugin that requires immediate attention. The absence of capability checks and nonce checks across its zero entry points is a gap, but the real danger lies in how data is handled internally and presented to users. The unpatched CVE is a clear indicator of ongoing risk, and the widespread lack of output escaping is a critical oversight that could lead to severe XSS attacks. Developers should prioritize addressing the unescaped output and the known CVE.

Key Concerns

  • Unpatched CVE (medium severity)
  • 0% of outputs properly escaped
  • Flows with unsanitized paths (2)
  • No capability checks
  • No nonce checks
Vulnerabilities
1

Invisible Optin Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-48311medium · 6.1Cross-Site Request Forgery (CSRF)

Invisible Optin <= 1.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting

Aug 25, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Invisible Optin Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
5 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

71% prepared7 total queries

Output Escaping

0% escaped4 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
invisible_optin_settings_form (invisible_optin_settings.php:51)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Invisible Optin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_initinvisible_optin.php:16
actionadmin_headinvisible_optin.php:17
actionplugins_loadedinvisible_optin.php:82
actionadmin_menuinvisible_optin.php:88
actionwp_headinvisible_optin.php:97
actionadmin_enqueue_scriptsinvisible_optin.php:130
actionadmin_initinvisible_optin_settings.php:4
actionadmin_headinvisible_optin_settings.php:5
Maintenance & Trust

Invisible Optin Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.0
Last updatedJan 27, 2015
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings1
Active installs90
Developer Profile

Invisible Optin Developer Profile

OffClicks

1 plugin · 90 total installs

68
trust score
Avg Security Score
63/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Invisible Optin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/invisible-optin/css/invisible_optin.css

HTML / DOM Fingerprints

HTML Comments
<!-- Custom Code Start-->
FAQ

Frequently Asked Questions about Invisible Optin