LC Tracking Codes Security & Risk Analysis
wordpress.org/plugins/lcmd-tracking-codesThis plugin make easier put tracking codes in your site.
Is LC Tracking Codes Safe to Use in 2026?
Generally Safe
Score 100/100LC Tracking Codes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The lcmd-tracking-codes v1.1.9 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for SQL queries and has no known vulnerabilities or CVEs. The absence of dangerous functions, external HTTP requests, and bundled libraries are also positive indicators. However, significant concerns arise from the static analysis. The plugin exposes one REST API route without any permission callbacks, creating a direct attack vector. Furthermore, a substantial portion of its output (84%) is not properly escaped, posing a risk of Cross-Site Scripting (XSS) vulnerabilities if the data being output is user-controlled or from an untrusted source.
The taint analysis shows no critical or high severity unsanitized paths, which is encouraging. However, this analysis only covers two flows, which may not be exhaustive. The lack of nonce checks on the single unprotected entry point (the REST API route) is a major concern, as it could allow for Cross-Site Request Forgery (CSRF) attacks. The plugin also lacks comprehensive capability checks beyond the one identified, particularly for the unprotected REST API endpoint.
Overall, while the plugin's SQL handling and lack of historical vulnerabilities are strengths, the unprotected REST API endpoint, significant unescaped output, and absence of nonce checks on this critical entry point present notable security risks. The limited scope of the taint analysis also warrants caution. Addressing the unescaped output and securing the REST API endpoint with proper authorization and nonces are crucial steps to improve its security.
Key Concerns
- REST API route without permission callbacks
- High percentage of unescaped output
- No nonce checks on entry points
- Limited taint analysis scope
LC Tracking Codes Security Vulnerabilities
LC Tracking Codes Code Analysis
Output Escaping
Data Flow Analysis
LC Tracking Codes Attack Surface
REST API Routes 1
WordPress Hooks 13
Maintenance & Trust
LC Tracking Codes Maintenance & Trust
Maintenance Signals
Community Trust
LC Tracking Codes Alternatives
GTM4WP – A Google Tag Manager (GTM) plugin for WordPress
duracelltomi-google-tag-manager
Advanced tag management for WordPress with Google Tag Manager
Pixel Manager for WooCommerce – Conversion Tracking, Google Ads, GA4, TikTok, Dynamic Remarketing
woocommerce-google-adwords-conversion-tracking-tag
Conversion tracking for WooCommerce. Google Ads, GA4, Meta/Facebook Pixel, TikTok & more. Recover 30% more conversions with server-side tracking!
Conversios: Google Analytics (GA4), Google Ads, Conversion and Analytics Tracking for Multi-Channels
enhanced-e-commerce-for-woocommerce-store
Track GA4 Analytics, Google Ads, Microsoft Ads, & Conversion with server-side tracking (CAPI) & product feed to improve ROAS, reports for WooCommerce.
Wp-Insert
wp-insert
The Ultimate Adsense / Ad-Management Plugin for Wordpress
Pixel Tag Manager for WooCommerce – Google Analytics 4, Google Ads, and More Pixels
pixel-manager-for-woocommerce
Pixel Tag Manager for WooCommerce is a powerful plugin to monitor eCommerce events with seamless integration. Track Google Analytics 4, Google Ads, Bi …
LC Tracking Codes Developer Profile
1 plugin · 0 total installs
How We Detect LC Tracking Codes
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/lcmd-tracking-codes/includes/css/admin_options.cssHTML / DOM Fingerprints
site_url/wp-json/lcmd-tracking-codes/v1/option/delete/(?P<field>[\w_]+)