LC Tracking Codes Security & Risk Analysis

wordpress.org/plugins/lcmd-tracking-codes

This plugin make easier put tracking codes in your site.

0 active installs v1.1.9 PHP 7.0+ WP 4.8+ Updated Unknown
google-adsgoogle-analyticsgoogle-searchgoogle-webmasterstracking-codes
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is LC Tracking Codes Safe to Use in 2026?

Generally Safe

Score 100/100

LC Tracking Codes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The lcmd-tracking-codes v1.1.9 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for SQL queries and has no known vulnerabilities or CVEs. The absence of dangerous functions, external HTTP requests, and bundled libraries are also positive indicators. However, significant concerns arise from the static analysis. The plugin exposes one REST API route without any permission callbacks, creating a direct attack vector. Furthermore, a substantial portion of its output (84%) is not properly escaped, posing a risk of Cross-Site Scripting (XSS) vulnerabilities if the data being output is user-controlled or from an untrusted source.

The taint analysis shows no critical or high severity unsanitized paths, which is encouraging. However, this analysis only covers two flows, which may not be exhaustive. The lack of nonce checks on the single unprotected entry point (the REST API route) is a major concern, as it could allow for Cross-Site Request Forgery (CSRF) attacks. The plugin also lacks comprehensive capability checks beyond the one identified, particularly for the unprotected REST API endpoint.

Overall, while the plugin's SQL handling and lack of historical vulnerabilities are strengths, the unprotected REST API endpoint, significant unescaped output, and absence of nonce checks on this critical entry point present notable security risks. The limited scope of the taint analysis also warrants caution. Addressing the unescaped output and securing the REST API endpoint with proper authorization and nonces are crucial steps to improve its security.

Key Concerns

  • REST API route without permission callbacks
  • High percentage of unescaped output
  • No nonce checks on entry points
  • Limited taint analysis scope
Vulnerabilities
None known

LC Tracking Codes Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

LC Tracking Codes Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
48
9 escaped
Nonce Checks
0
Capability Checks
1
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

16% escaped57 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
show_admin_page (lcmd-tracking-codes.php:241)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

LC Tracking Codes Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

GET/wp-json/lcmd-tracking-codes/v1/option/delete/(?P<field>[\w_]+)lcmd-tracking-codes.php:124
WordPress Hooks 13
actioninitlcmd-tracking-codes.php:95
actionwp_headlcmd-tracking-codes.php:98
actionwp_headlcmd-tracking-codes.php:99
actionwp_headlcmd-tracking-codes.php:102
actionwp_headlcmd-tracking-codes.php:104
actionafter_bodylcmd-tracking-codes.php:107
actionwp_footerlcmd-tracking-codes.php:110
actionwp_footerlcmd-tracking-codes.php:113
actionadmin_menulcmd-tracking-codes.php:116
actionadmin_enqueue_scriptslcmd-tracking-codes.php:119
actionadmin_footerlcmd-tracking-codes.php:120
actionrest_api_initlcmd-tracking-codes.php:123
actionadmin_initlcmd-tracking-codes.php:131
Maintenance & Trust

LC Tracking Codes Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedUnknown
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

LC Tracking Codes Developer Profile

lcloss

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect LC Tracking Codes

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/lcmd-tracking-codes/includes/css/admin_options.css

HTML / DOM Fingerprints

JS Globals
site_url
REST Endpoints
/wp-json/lcmd-tracking-codes/v1/option/delete/(?P<field>[\w_]+)
FAQ

Frequently Asked Questions about LC Tracking Codes