
Matomo Site Kit Security & Risk Analysis
wordpress.org/plugins/openmost-site-kitThe most complete Matomo Analytics plugin for WordPress. Server-side tracking, WooCommerce ecommerce, site search, GDPR compliance, and Tag Manager su …
Is Matomo Site Kit Safe to Use in 2026?
Generally Safe
Score 100/100Matomo Site Kit has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The openmost-site-kit plugin v2.2.0 exhibits a generally positive security posture with several good practices evident. The complete absence of recorded CVEs, dangerous functions, and raw SQL queries is a strong indicator of a well-maintained and secure codebase. The use of prepared statements for all SQL queries and a high percentage of properly escaped output further bolster its security. The plugin also demonstrates awareness of WordPress security by implementing capability checks on many of its entry points.
However, there are specific areas of concern that warrant attention. The presence of a REST API route without a permission callback represents a significant security risk, as it could be accessed by unauthenticated users. While no taint flows were identified, the limited static analysis scope (0 flows analyzed) means this is not a definitive guarantee of safety. The lack of nonce checks on AJAX handlers, although there are no AJAX handlers without auth checks, is still a weakness that could be exploited in conjunction with other vulnerabilities if they were to arise. The plugin's vulnerability history is clean, which is a positive sign, but it's crucial to remember that past security is not always indicative of future security, especially with active development.
In conclusion, openmost-site-kit v2.2.0 has a solid foundation with strong security practices. The main area of concern is the unprotected REST API route. The absence of identified vulnerabilities is encouraging, but the plugin's attack surface, particularly the unprotected REST API endpoint, needs to be addressed to further improve its security. Focusing on securing all entry points and considering more comprehensive taint analysis would be beneficial.
Key Concerns
- REST API route without permission callback
- Lack of nonce checks on AJAX handlers
- Only 74% of output properly escaped
Matomo Site Kit Security Vulnerabilities
Matomo Site Kit Code Analysis
Output Escaping
Matomo Site Kit Attack Surface
REST API Routes 6
Shortcodes 2
WordPress Hooks 24
Maintenance & Trust
Matomo Site Kit Maintenance & Trust
Maintenance Signals
Community Trust
Matomo Site Kit Alternatives
Connect Matomo – Analytics Dashboard for WordPress
wp-piwik
Adds Matomo (former Piwik) statistics to your WordPress dashboard and is also able to add the Matomo Tracking Code to your blog.
Include Matomo Tracking, by Jonas Hellmann
include-matomo
This plugin lets you integrate your existing Matomo On-Premise into WordPress. If you don't already have a working Matomo (either On-Premise or M …
Easy UTM Builder
easy-utm-builder
Easy to build trackable URLs with UTM parameters in Bulk (complete site or specific post type) for Google Analytics!
Tracktastic: Free Matomo Integration for WooCommerce
tracktastic
Tracktastic is a free plugin to integrate Matomo eCommerce tracking with WooCommerce. Optimize your sales with powerful analytics!
Growify
growify-ai
Integrate Growify.ai analytics into your WordPress site effortlessly. Track visits, WooCommerce conversions and form submissions automatically.
Matomo Site Kit Developer Profile
2 plugins · 80 total installs
How We Detect Matomo Site Kit
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/openmost-site-kit/build/index.asset.phpHTML / DOM Fingerprints
openmostSiteKit/wp-json/openmost-site-kit/v1/settings/wp-json/openmost-site-kit/v1/options