Nimbata Call Tracking Security & Risk Analysis

wordpress.org/plugins/nimbata-call-tracking

Dynamically swap your site's phone number with a nimbata tracking numbers. Track which sources generate phone leads to your business.

400 active installs v1.8.0 PHP 5.0.2+ WP 3.0+ Updated Apr 8, 2026
adwordsanalyticscall-trackingppcseo
79
B · Generally Safe
CVEs total1
Unpatched1
Last CVEApr 9, 2025
Safety Verdict

Is Nimbata Call Tracking Safe to Use in 2026?

Mostly Safe

Score 79/100

Nimbata Call Tracking is generally safe to use. 1 past CVE were resolved.

1 known CVE 1 unpatched Last CVE: Apr 9, 2025Updated 1mo ago
Risk Assessment

The nimbata-call-tracking plugin v1.7.4 exhibits a generally strong security posture based on the static analysis. The absence of any direct attack surface points such as AJAX handlers, REST API routes, or shortcodes without authentication is a significant positive. Furthermore, the code demonstrates good practices by utilizing prepared statements for all SQL queries, implementing nonce checks, and capability checks, and ensuring a reasonable level of output escaping. There are no identified dangerous functions, file operations, external HTTP requests, or tainted data flows that would suggest immediate critical risks within the analyzed code.

However, the presence of a known, currently unpatched medium-severity vulnerability is a significant concern that detracts from the overall security. The history of a past Cross-Site Request Forgery (CSRF) vulnerability, even if patched, suggests a potential area of weakness that attackers might target again. While the static analysis shows no immediate exploitable flaws in the current version's code, the unpatched CVE represents a concrete risk that requires immediate attention. The plugin has a good foundation in secure coding practices, but the unaddressed vulnerability is a clear weakness that elevates the overall risk profile.

In conclusion, while the code itself appears to be written with security in mind, the existence of an unpatched medium-severity vulnerability is a critical issue. Users should prioritize updating the plugin as soon as a patched version is available. The plugin's adherence to many secure coding principles is commendable, but it is overshadowed by the known exploitable flaw.

Key Concerns

  • Unpatched medium-severity CVE
  • 71% output escaping (potential for minor XSS)
Vulnerabilities
1 published

Nimbata Call Tracking Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-32616medium · 6.1Cross-Site Request Forgery (CSRF)

Nimbata Call Tracking <= 1.7.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting

Apr 9, 2025Unpatched
Version History

Nimbata Call Tracking Release Timeline

v1.8.0Current1 CVE
v1.7.41 CVE
v1.7.31 CVE
v1.7.21 CVE
v1.7.11 CVE
v1.71 CVE
v1.61 CVE
v1.51 CVE
v1.31 CVE
v1.21 CVE
v1.11 CVE
v1.01 CVE
Code Analysis
Analyzed Mar 16, 2026

Nimbata Call Tracking Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
5 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

71% escaped7 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
nimbata_options (nimbata.php:75)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Nimbata Call Tracking Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initnimbata.php:67
actionadmin_menunimbata.php:68
actionadmin_noticesnimbata.php:69
actionwp_enqueue_scriptsnimbata.php:71
filterscript_loader_tagnimbata.php:72
Maintenance & Trust

Nimbata Call Tracking Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedApr 8, 2026
PHP min version5.0.2
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs400
Developer Profile

Nimbata Call Tracking Developer Profile

nimbata

1 plugin · 400 total installs

79
trust score
Avg Security Score
79/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Nimbata Call Tracking

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
//cdn.dni.nimbata.com/
Version Parameters
nimbata-ct-script-

HTML / DOM Fingerprints

Data Attributes
name="nimbata_dni_id_input"name="nimbata_dni_sri_input"placeholder="shaNNN-XXXXXXXX"
FAQ

Frequently Asked Questions about Nimbata Call Tracking