Metricool Security & Risk Analysis

wordpress.org/plugins/metricool

Metricool is the first tool designed to measure #Blog impact and #SocialMedia activity.

80K active installs v1.26 PHP + WP 3.6+ Updated Feb 2, 2026
analyticsblogmetricoolmetricstracking
100
A · Safe
CVEs total1
Unpatched0
Last CVEDec 20, 2022
Safety Verdict

Is Metricool Safe to Use in 2026?

Generally Safe

Score 100/100

Metricool has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Dec 20, 2022Updated 2mo ago
Risk Assessment

The static analysis of Metricool v1.26 reveals a generally positive security posture in several key areas. The plugin has a small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are not protected by authentication or permission checks. Furthermore, it avoids dangerous functions, performs file operations, and makes external HTTP requests, which are all positive signs. SQL queries are also 100% prepared, and there's a single nonce check present.

However, a significant concern arises from the complete lack of output escaping. With 6 total outputs and 0% properly escaped, this indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. The vulnerability history confirms this, with one medium severity CVE historically recorded for XSS, last patched in late 2022. While there are no currently unpatched CVEs or critical/high severity taint flows, the consistent pattern of output escaping issues and past XSS vulnerabilities warrants caution. The plugin's strengths lie in its limited attack surface and secure handling of database queries and external requests, but the unescaped output represents a critical weakness that could be exploited.

Key Concerns

  • Unescaped output found
  • Medium severity vulnerability history
Vulnerabilities
1

Metricool Security Vulnerabilities

CVEs by Year

1 CVE in 2022
2022
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2022-4299medium · 5.5Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Metricool <= 1.17 - Authenticated (Administrator+) Stored Stored Cross-Site Scripting

Dec 20, 2022 Patched in 1.18 (399d)
Code Analysis
Analyzed Mar 16, 2026

Metricool Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
adminPanel (metricool.php:71)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Metricool Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_initmetricool.php:45
actionadmin_menumetricool.php:46
actionadmin_bar_menumetricool.php:47
actionwp_footermetricool.php:50
Maintenance & Trust

Metricool Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 2, 2026
PHP min version
Downloads780K

Community Trust

Rating78/100
Number of ratings7
Active installs80K
Developer Profile

Metricool Developer Profile

juan.pablo.tejela

1 plugin · 80K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
399 days
View full developer profile
Detection Fingerprints

How We Detect Metricool

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
beTracker
FAQ

Frequently Asked Questions about Metricool