Multi-Page Campaign Tracking Security & Risk Analysis

wordpress.org/plugins/mdi-persist-query-string

Persist query string parameters across page visits for tracking and analytics purposes.

0 active installs v1.0.1 PHP 7.0+ WP 5.5+ Updated Mar 16, 2026
analyticsmarketingquery-stringtrackingutm
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Multi-Page Campaign Tracking Safe to Use in 2026?

Generally Safe

Score 100/100

Multi-Page Campaign Tracking has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "mdi-persist-query-string" v1.0.1 plugin exhibits a strong security posture based on the provided static analysis. The plugin has no identified attack surface, meaning there are no exposed AJAX handlers, REST API routes, shortcodes, or cron events that could be directly exploited. Furthermore, the code analysis reveals no dangerous functions used, all SQL queries are properly prepared, and all output is correctly escaped. The absence of file operations, external HTTP requests, and any recorded vulnerabilities, including CVEs, further reinforces its secure design.

While the plugin demonstrates excellent adherence to secure coding practices, a notable area for attention is the complete lack of nonce and capability checks. Although the current analysis shows no unprotected entry points, this absence of authentication and authorization checks could become a significant concern if the plugin were to evolve and introduce new features that interact with sensitive data or functionality. The lack of taint analysis flows could also mask potential vulnerabilities if the plugin were to process user-supplied data in the future without proper sanitization.

In conclusion, "mdi-persist-query-string" v1.0.1 is currently a very secure plugin with no known vulnerabilities or obvious exploitable code. Its strengths lie in its minimal attack surface and robust handling of SQL and output. The primary weakness is the potential future risk introduced by the absence of any authentication or authorization mechanisms, which would be crucial if the plugin's functionality were to expand.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Multi-Page Campaign Tracking Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Multi-Page Campaign Tracking Release Timeline

v1.0.1Current
v1.0.0
Code Analysis
Analyzed Mar 17, 2026

Multi-Page Campaign Tracking Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

Multi-Page Campaign Tracking Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionplugins_loadedmdi-persist-query-string.php:303
Maintenance & Trust

Multi-Page Campaign Tracking Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 16, 2026
PHP min version7.0
Downloads197

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Multi-Page Campaign Tracking Developer Profile

Medium Interactive

5 plugins · 30 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Multi-Page Campaign Tracking

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Multi-Page Campaign Tracking