IthStatsWP Client Security & Risk Analysis

wordpress.org/plugins/ithstatswp-client

Install this plugin on unlimited sites and manage them all from a central dashboard.

10 active installs v0.0.2 PHP + WP 3.0+ Updated Apr 28, 2016
adminadministrationapiauthenticationrestfull-api
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is IthStatsWP Client Safe to Use in 2026?

Generally Safe

Score 85/100

IthStatsWP Client has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The static analysis of "ithstatswp-client" v0.0.2 reveals a plugin with a seemingly very small attack surface, as indicated by zero AJAX handlers, REST API routes, shortcodes, and cron events. Furthermore, the absence of critical code signals like dangerous functions and the use of prepared statements for all SQL queries are positive indicators of good development practices. Taint analysis showing zero flows, especially unsanitized paths, further contributes to a positive initial security assessment.

However, the analysis also highlights significant areas of concern. The fact that 100% of output is not properly escaped is a critical weakness. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the plugin's output and executed in the user's browser. Additionally, the complete lack of nonce checks and capability checks, especially considering there are no explicit authentication checks on entry points (though the attack surface is currently zero), leaves the plugin vulnerable to CSRF attacks and privilege escalation if any entry points were to be introduced or become accessible without proper authorization. The single file operation also warrants a closer look, as its context and security controls are not detailed.

Given the plugin's current version and the absence of recorded historical vulnerabilities, it's difficult to infer long-term patterns. This could mean the plugin is new, has always been secure, or simply hasn't been extensively audited or targeted. The current snapshot, however, points to a plugin that has avoided some common pitfalls (like raw SQL and dangerous functions) but has critical oversights in output sanitization and authorization checks. The lack of these fundamental security measures presents a notable risk despite the small current attack surface.

Key Concerns

  • Unescaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

IthStatsWP Client Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

IthStatsWP Client Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

IthStatsWP Client Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionsetup_themeinit.php:42
actionadmin_enqueue_scriptsinit.php:45
actionadmin_noticesinit.php:46
actionadmin_enqueue_scriptsinit.php:62
actionadmin_noticesinit.php:63
Maintenance & Trust

IthStatsWP Client Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedApr 28, 2016
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

IthStatsWP Client Developer Profile

4ebizz

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect IthStatsWP Client

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ithstatswp-client/assets/css/styles.css
Version Parameters
ithstatswp-client/assets/css/styles.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about IthStatsWP Client