MDI Persist Query String Security & Risk Analysis

wordpress.org/plugins/mdi-persist-query-string

Persist query string parameters across page visits for tracking and analytics purposes.

0 active installs v1.0.0 PHP 7.0+ WP 5.5+ Updated Feb 11, 2026
analyticsmarketingquery-stringtrackingutm
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is MDI Persist Query String Safe to Use in 2026?

Generally Safe

Score 100/100

MDI Persist Query String has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "mdi-persist-query-string" v1.0.1 plugin exhibits a strong security posture based on the provided static analysis. The plugin has no identified attack surface, meaning there are no exposed AJAX handlers, REST API routes, shortcodes, or cron events that could be directly exploited. Furthermore, the code analysis reveals no dangerous functions used, all SQL queries are properly prepared, and all output is correctly escaped. The absence of file operations, external HTTP requests, and any recorded vulnerabilities, including CVEs, further reinforces its secure design.

While the plugin demonstrates excellent adherence to secure coding practices, a notable area for attention is the complete lack of nonce and capability checks. Although the current analysis shows no unprotected entry points, this absence of authentication and authorization checks could become a significant concern if the plugin were to evolve and introduce new features that interact with sensitive data or functionality. The lack of taint analysis flows could also mask potential vulnerabilities if the plugin were to process user-supplied data in the future without proper sanitization.

In conclusion, "mdi-persist-query-string" v1.0.1 is currently a very secure plugin with no known vulnerabilities or obvious exploitable code. Its strengths lie in its minimal attack surface and robust handling of SQL and output. The primary weakness is the potential future risk introduced by the absence of any authentication or authorization mechanisms, which would be crucial if the plugin's functionality were to expand.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

MDI Persist Query String Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

MDI Persist Query String Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

MDI Persist Query String Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionplugins_loadedmdi-persist-query-string.php:303
Maintenance & Trust

MDI Persist Query String Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 11, 2026
PHP min version7.0
Downloads129

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

MDI Persist Query String Developer Profile

Medium Interactive

3 plugins · 30 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MDI Persist Query String

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about MDI Persist Query String