IQ Analytics Tracking Code In Head Security & Risk Analysis

wordpress.org/plugins/iq-inhead-analytics

Add Analytics tracking code the smart way and inline in the html head in less then 2 minutes. Tracking options for including logged in users and admin …

10 active installs v0.2.1 PHP + WP 2.9+ Updated Mar 26, 2016
analyticsgooglegoogle-analyticstracking-code
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is IQ Analytics Tracking Code In Head Safe to Use in 2026?

Generally Safe

Score 85/100

IQ Analytics Tracking Code In Head has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'iq-inhead-analytics' v0.2.1 plugin exhibits a seemingly strong security posture based on the static analysis, with no identified dangerous functions, SQL queries executed via prepared statements, or external HTTP requests. The absence of known vulnerabilities (CVEs) in its history further suggests a history of secure development. However, the critical finding of 0% output escaping for all four identified output points presents a significant concern. This means that any data processed by the plugin and then displayed to users is not being properly sanitized, leaving it vulnerable to Cross-Site Scripting (XSS) attacks.

While the attack surface appears minimal with no AJAX handlers, REST API routes, shortcodes, or cron events, the lack of robust output escaping negates much of this perceived security. The presence of only one capability check and zero nonce checks on the identified code signals, combined with 0% output escaping, indicates a potential for unauthorized actions or information disclosure if an attacker can find a way to inject malicious data. The zero taint analysis results are encouraging, but they might be a consequence of the minimal identified code flows rather than a testament to comprehensive sanitization.

In conclusion, despite the lack of historical vulnerabilities and a small attack surface, the severe lack of output escaping is a critical weakness that overshadows the plugin's strengths. Users of this plugin should be aware of the XSS risks and consider the potential for other vulnerabilities if the plugin's functionality expands in the future. The plugin developers should prioritize addressing the output escaping issues.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

IQ Analytics Tracking Code In Head Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

IQ Analytics Tracking Code In Head Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

IQ Analytics Tracking Code In Head Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_headiqaplugin.ctrl.php:16
actionadmin_menuiqasettings.ctrl.php:16
actionadmin_initiqasettings.ctrl.php:19
Maintenance & Trust

IQ Analytics Tracking Code In Head Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedMar 26, 2016
PHP min version
Downloads1K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

IQ Analytics Tracking Code In Head Developer Profile

omnileads

2 plugins · 810 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect IQ Analytics Tracking Code In Head

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/iq-inhead-analytics/
Version Parameters
iq-inhead-analytics/style.css?ver=iq-inhead-analytics/script.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about IQ Analytics Tracking Code In Head