Landing sites Security & Risk Analysis

wordpress.org/plugins/landing-sites

When visitors is referred to your site from a search engine, the plugin is showing them related posts to their search on your blog.

100 active installs v1.5.2 PHP + WP 2.0.2+ Updated Nov 6, 2015
googlerefererrelatedsearchseo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Landing sites Safe to Use in 2026?

Generally Safe

Score 85/100

Landing sites has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "landing-sites" plugin v1.5.2 presents a mixed security picture. On one hand, the lack of known CVEs and a generally small attack surface (zero AJAX, REST API, shortcodes, or cron events) are positive indicators. The plugin also avoids common pitfalls like bundled libraries or external HTTP requests. However, significant concerns arise from the static analysis. A concerning 100% of output is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if any data displayed to users originates from an untrusted source. Furthermore, the taint analysis reveals a high severity flow with unsanitized paths, indicating a potential risk of code injection or other vulnerabilities that could be exploited.

The vulnerability history is clean, which is a strength, but it doesn't negate the immediate risks identified in the code. The lack of nonces and capability checks across all entry points (though there are none currently) suggests a potential weakness if new entry points are introduced without proper security considerations. While the plugin has strengths in its limited attack surface and clean vulnerability history, the unescaped output and high-severity taint flow are critical areas that require immediate attention to mitigate potential security risks.

Key Concerns

  • High severity taint flow with unsanitized paths
  • 0% of output properly escaped
  • SQL queries not fully using prepared statements
  • 0 capability checks across all entry points
  • 0 nonce checks across all entry points
Vulnerabilities
None known

Landing sites Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Landing sites Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
1 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

33% prepared3 total queries

Output Escaping

0% escaped5 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
ls_getinfo (landingsites.php:179)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Landing sites Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actioninitlandingsites.php:214
Maintenance & Trust

Landing sites Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedNov 6, 2015
PHP min version
Downloads31K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Landing sites Developer Profile

SomeUser

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Landing sites

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[ls_related][ls_search_engines][ls_getinfo]
FAQ

Frequently Asked Questions about Landing sites