Omniture – SiteCatalyst Security & Risk Analysis

wordpress.org/plugins/omniture-sitecatalyst

This plugin will add tracking features to your wordpress blog without have to know any PHP, edit code, or cut and paste tracking code to footers.

10 active installs v0.1.0 PHP + WP 2.8+ Updated Unknown
omniture-web-analyticsstatisticsstatstracking
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Omniture – SiteCatalyst Safe to Use in 2026?

Generally Safe

Score 100/100

Omniture – SiteCatalyst has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "omniture-sitecatalyst" v0.1.0 plugin exhibits a seemingly strong security posture based on the provided static analysis. There are no identified entry points in the attack surface (AJAX, REST API, shortcodes, cron events) that lack authentication or permission checks, which is a significant positive. Furthermore, the code signals reveal no dangerous functions, no direct file operations, no external HTTP requests, and importantly, SQL queries are 100% prepared statements, indicating good data sanitization practices for database interactions. The vulnerability history also shows no recorded CVEs, suggesting a lack of publicly known exploitable issues.

However, a critical concern arises from the output escaping. With 11 total outputs and 0% properly escaped, this presents a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data processed or displayed by the plugin that is not properly escaped could be manipulated by attackers to inject malicious scripts into the user's browser. The absence of nonce checks on any potential entry points (though none were identified) is also a weakness, as nonces are a fundamental defense against CSRF attacks. The single capability check found is positive but insufficient given the potential for unescaped output to be a vector for other attacks.

In conclusion, while the plugin demonstrates strengths in its limited attack surface and secure SQL handling, the pervasive lack of output escaping is a severe deficiency that overshadows these positives. The absence of vulnerabilities in its history is encouraging but doesn't mitigate the immediate risk posed by the identified code signals. Addressing the output escaping issue should be the highest priority to improve the plugin's security.

Key Concerns

  • Unescaped output in 11 instances
  • No nonce checks on potential entry points
Vulnerabilities
None known

Omniture – SiteCatalyst Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Omniture – SiteCatalyst Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
11
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped11 total outputs
Attack Surface

Omniture – SiteCatalyst Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwp_dashboard_setupomniture.php:81
actionadmin_menuomniture.php:443
actionwp_footeromniture.php:444
actioncomment_postomniture.php:445
Maintenance & Trust

Omniture – SiteCatalyst Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedUnknown
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Omniture – SiteCatalyst Developer Profile

rudishumpert

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Omniture – SiteCatalyst

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/omniture-sitecatalyst/omniture.php

HTML / DOM Fingerprints

JS Globals
omni_version
FAQ

Frequently Asked Questions about Omniture – SiteCatalyst