
MDI Persist Query String Security & Risk Analysis
wordpress.org/plugins/mdi-persist-query-stringPersist query string parameters across page visits for tracking and analytics purposes.
Is MDI Persist Query String Safe to Use in 2026?
Generally Safe
Score 100/100MDI Persist Query String has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "mdi-persist-query-string" v1.0.1 plugin exhibits a strong security posture based on the provided static analysis. The plugin has no identified attack surface, meaning there are no exposed AJAX handlers, REST API routes, shortcodes, or cron events that could be directly exploited. Furthermore, the code analysis reveals no dangerous functions used, all SQL queries are properly prepared, and all output is correctly escaped. The absence of file operations, external HTTP requests, and any recorded vulnerabilities, including CVEs, further reinforces its secure design.
While the plugin demonstrates excellent adherence to secure coding practices, a notable area for attention is the complete lack of nonce and capability checks. Although the current analysis shows no unprotected entry points, this absence of authentication and authorization checks could become a significant concern if the plugin were to evolve and introduce new features that interact with sensitive data or functionality. The lack of taint analysis flows could also mask potential vulnerabilities if the plugin were to process user-supplied data in the future without proper sanitization.
In conclusion, "mdi-persist-query-string" v1.0.1 is currently a very secure plugin with no known vulnerabilities or obvious exploitable code. Its strengths lie in its minimal attack surface and robust handling of SQL and output. The primary weakness is the potential future risk introduced by the absence of any authentication or authorization mechanisms, which would be crucial if the plugin's functionality were to expand.
Key Concerns
- Missing nonce checks
- Missing capability checks
MDI Persist Query String Security Vulnerabilities
MDI Persist Query String Code Analysis
Output Escaping
MDI Persist Query String Attack Surface
WordPress Hooks 1
Maintenance & Trust
MDI Persist Query String Maintenance & Trust
Maintenance Signals
Community Trust
MDI Persist Query String Alternatives
BaseCloud UTM Tracker
basecloud-utm-tracker
Advanced UTM tracking with automated webhook injection for Gravity Forms, Elementor, WPForms, and Contact Form 7.
MZ UTM Tracker for Gravity Form
mondoloz-utm-tracker-for-gravity-forms
Automatically captures UTM parameters from URLs and populates corresponding Gravity Forms fields for advanced lead tracking.
CallTrackingMetrics
call-tracking-metrics
CallTrackingMetrics integrates with your WordPress site to provide powerful call tracking and attribution.
Clixtell
clixtell-tracking-dynamic-phones
Clixtell Tracking & Dynamic Phones integrates Clixtell click fraud detection and dynamic phone number insertion into your WordPress site.
UTM Event Tracker and Analytics, UTM Grabber
utm-event-tracker-and-analytics
Easily capture UTM parameters, track button and link clicks, and analyze campaigns to improve your marketing ROI in WordPress.
MDI Persist Query String Developer Profile
3 plugins · 30 total installs
How We Detect MDI Persist Query String
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.