Nimbata Call Tracking Security & Risk Analysis
wordpress.org/plugins/nimbata-call-trackingDynamically swap your site's phone number with a nimbata tracking numbers. Track which sources generate phone leads to your business.
Is Nimbata Call Tracking Safe to Use in 2026?
Mostly Safe
Score 79/100Nimbata Call Tracking is generally safe to use. 1 past CVE were resolved.
The nimbata-call-tracking plugin v1.7.4 exhibits a generally strong security posture based on the static analysis. The absence of any direct attack surface points such as AJAX handlers, REST API routes, or shortcodes without authentication is a significant positive. Furthermore, the code demonstrates good practices by utilizing prepared statements for all SQL queries, implementing nonce checks, and capability checks, and ensuring a reasonable level of output escaping. There are no identified dangerous functions, file operations, external HTTP requests, or tainted data flows that would suggest immediate critical risks within the analyzed code.
However, the presence of a known, currently unpatched medium-severity vulnerability is a significant concern that detracts from the overall security. The history of a past Cross-Site Request Forgery (CSRF) vulnerability, even if patched, suggests a potential area of weakness that attackers might target again. While the static analysis shows no immediate exploitable flaws in the current version's code, the unpatched CVE represents a concrete risk that requires immediate attention. The plugin has a good foundation in secure coding practices, but the unaddressed vulnerability is a clear weakness that elevates the overall risk profile.
In conclusion, while the code itself appears to be written with security in mind, the existence of an unpatched medium-severity vulnerability is a critical issue. Users should prioritize updating the plugin as soon as a patched version is available. The plugin's adherence to many secure coding principles is commendable, but it is overshadowed by the known exploitable flaw.
Key Concerns
- Unpatched medium-severity CVE
- 71% output escaping (potential for minor XSS)
Nimbata Call Tracking Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Nimbata Call Tracking <= 1.7.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting
Nimbata Call Tracking Release Timeline
Nimbata Call Tracking Code Analysis
Output Escaping
Data Flow Analysis
Nimbata Call Tracking Attack Surface
WordPress Hooks 5
Maintenance & Trust
Nimbata Call Tracking Maintenance & Trust
Maintenance Signals
Community Trust
Nimbata Call Tracking Alternatives
CallRail Phone Call Tracking
callrail-phone-call-tracking
Dynamically swap CallRail tracking phone numbers based on the visitor's referring source.
CallTracker
calltracker
Elegantly simple call tracking for your business.
Freespee Call Tracking
freespee-call-tracking
See which visitors ended up calling you, no coding required. Automated delivery of phone call data to your Google Analytics account.
SEO SIMPLE PACK
seo-simple-pack
This is a very simple SEO plugin. You can easily set and customize meta tags and OGP tags for each page.
AI Powered Marketing
kliken-marketing-for-google
Kliken's all-in-one marketing helps businesses reach high-intent customers, beat the competition and see sales growth while lowering conversion costs
Nimbata Call Tracking Developer Profile
1 plugin · 400 total installs
How We Detect Nimbata Call Tracking
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
//cdn.dni.nimbata.com/nimbata-ct-script-HTML / DOM Fingerprints
name="nimbata_dni_id_input"name="nimbata_dni_sri_input"placeholder="shaNNN-XXXXXXXX"