
Omniture – SiteCatalyst Security & Risk Analysis
wordpress.org/plugins/omniture-sitecatalystThis plugin will add tracking features to your wordpress blog without have to know any PHP, edit code, or cut and paste tracking code to footers.
Is Omniture – SiteCatalyst Safe to Use in 2026?
Generally Safe
Score 100/100Omniture – SiteCatalyst has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "omniture-sitecatalyst" v0.1.0 plugin exhibits a seemingly strong security posture based on the provided static analysis. There are no identified entry points in the attack surface (AJAX, REST API, shortcodes, cron events) that lack authentication or permission checks, which is a significant positive. Furthermore, the code signals reveal no dangerous functions, no direct file operations, no external HTTP requests, and importantly, SQL queries are 100% prepared statements, indicating good data sanitization practices for database interactions. The vulnerability history also shows no recorded CVEs, suggesting a lack of publicly known exploitable issues.
However, a critical concern arises from the output escaping. With 11 total outputs and 0% properly escaped, this presents a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data processed or displayed by the plugin that is not properly escaped could be manipulated by attackers to inject malicious scripts into the user's browser. The absence of nonce checks on any potential entry points (though none were identified) is also a weakness, as nonces are a fundamental defense against CSRF attacks. The single capability check found is positive but insufficient given the potential for unescaped output to be a vector for other attacks.
In conclusion, while the plugin demonstrates strengths in its limited attack surface and secure SQL handling, the pervasive lack of output escaping is a severe deficiency that overshadows these positives. The absence of vulnerabilities in its history is encouraging but doesn't mitigate the immediate risk posed by the identified code signals. Addressing the output escaping issue should be the highest priority to improve the plugin's security.
Key Concerns
- Unescaped output in 11 instances
- No nonce checks on potential entry points
Omniture – SiteCatalyst Security Vulnerabilities
Omniture – SiteCatalyst Code Analysis
Output Escaping
Omniture – SiteCatalyst Attack Surface
WordPress Hooks 4
Maintenance & Trust
Omniture – SiteCatalyst Maintenance & Trust
Maintenance Signals
Community Trust
Omniture – SiteCatalyst Alternatives
Connect Matomo – Analytics Dashboard for WordPress
wp-piwik
Adds Matomo (former Piwik) statistics to your WordPress dashboard and is also able to add the Matomo Tracking Code to your blog.
User Activity Tracking and Log
user-activity-tracking-and-log
Track time and monitor user activity & history on your website, LMS online learning system, membership or WooCommerce site.
Trace My IP – Visitor IP Tracker, Stats Analytics & Page Views Counter with Email Alerts
tracemyip-visitor-analytics-ip-tracking-control
Comprehensive visitor IP tracking and website analytics solution with real-time statistics, page view counting, and customizable email alerts.
Quantcast Quantifier
quantcast-quantifier
Allows you to easily add the necessary JavaScript code to enable Quantcast on your blog.
Stetic
stetic
Web Analytics from Stetic including many features. Displays a widget, a complete analytics dashboard page and adds the tracking code to your site.
Omniture – SiteCatalyst Developer Profile
2 plugins · 20 total installs
How We Detect Omniture – SiteCatalyst
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/omniture-sitecatalyst/omniture.phpHTML / DOM Fingerprints
omni_version