Matomo Site Kit Security & Risk Analysis

wordpress.org/plugins/openmost-site-kit

The most complete Matomo Analytics plugin for WordPress. Server-side tracking, WooCommerce ecommerce, site search, GDPR compliance, and Tag Manager su …

10 active installs v2.2.0 PHP 8.2+ WP 6.0+ Updated Mar 10, 2026
analyticsconnectecommercematomotracking
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Matomo Site Kit Safe to Use in 2026?

Generally Safe

Score 100/100

Matomo Site Kit has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 25d ago
Risk Assessment

The openmost-site-kit plugin v2.2.0 exhibits a generally positive security posture with several good practices evident. The complete absence of recorded CVEs, dangerous functions, and raw SQL queries is a strong indicator of a well-maintained and secure codebase. The use of prepared statements for all SQL queries and a high percentage of properly escaped output further bolster its security. The plugin also demonstrates awareness of WordPress security by implementing capability checks on many of its entry points.

However, there are specific areas of concern that warrant attention. The presence of a REST API route without a permission callback represents a significant security risk, as it could be accessed by unauthenticated users. While no taint flows were identified, the limited static analysis scope (0 flows analyzed) means this is not a definitive guarantee of safety. The lack of nonce checks on AJAX handlers, although there are no AJAX handlers without auth checks, is still a weakness that could be exploited in conjunction with other vulnerabilities if they were to arise. The plugin's vulnerability history is clean, which is a positive sign, but it's crucial to remember that past security is not always indicative of future security, especially with active development.

In conclusion, openmost-site-kit v2.2.0 has a solid foundation with strong security practices. The main area of concern is the unprotected REST API route. The absence of identified vulnerabilities is encouraging, but the plugin's attack surface, particularly the unprotected REST API endpoint, needs to be addressed to further improve its security. Focusing on securing all entry points and considering more comprehensive taint analysis would be beneficial.

Key Concerns

  • REST API route without permission callback
  • Lack of nonce checks on AJAX handlers
  • Only 74% of output properly escaped
Vulnerabilities
None known

Matomo Site Kit Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Matomo Site Kit Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
29
82 escaped
Nonce Checks
0
Capability Checks
4
File Operations
1
External Requests
4
Bundled Libraries
0

Output Escaping

74% escaped111 total outputs
Attack Surface
1 unprotected

Matomo Site Kit Attack Surface

Entry Points8
Unprotected1

REST API Routes 6

GET/wp-json/openmost-site-kit/v1/settingsincludes\rest-api.php:14
POST/wp-json/openmost-site-kit/v1/matomo/(?P<method>[a-zA-Z.]+)includes\rest-api.php:63
POST/wp-json/openmost-site-kit/v1/test-connectionincludes\rest-api.php:87
GET/wp-json/openmost-site-kit/v1/post-stats/(?P<post_id>\d+)includes\rest-api.php:111
GET/wp-json/openmost-site-kit/v1/rolesincludes\rest-api.php:135
GET/wp-json/openmost-site-kit/v1/post-typesincludes\rest-api.php:142

Shortcodes 2

[matomo_opt_out] modules\privacy\index.php:17
[omsk_matomo_opt_out] modules\privacy\index.php:18
WordPress Hooks 24
actionadmin_enqueue_scriptsincludes\assets.php:74
actionrest_api_initincludes\rest-api.php:10
actiontransition_post_statusmodules\annotations\index.php:17
actionadmin_menumodules\dashboard\index.php:32
actionadd_meta_boxesmodules\post-type-charts\index.php:33
actionwpmodules\search-tracking\index.php:21
actionwp_footermodules\search-tracking\index.php:53
actionwp_footermodules\search-tracking\index.php:58
actiontemplate_redirectmodules\server-tracking\index.php:24
actionadmin_menumodules\settings\index.php:32
actionwp_headmodules\tracking\index.php:20
actionwp_body_openmodules\tracking\index.php:23
actionplugins_loadedmodules\woocommerce\index.php:19
actionwoocommerce_after_single_productmodules\woocommerce\index.php:90
actionwoocommerce_add_to_cartmodules\woocommerce\index.php:93
actionwoocommerce_remove_cart_itemmodules\woocommerce\index.php:96
actionwoocommerce_after_cart_item_quantity_updatemodules\woocommerce\index.php:99
actionwoocommerce_thankyoumodules\woocommerce\index.php:102
actionwoocommerce_after_shop_loopmodules\woocommerce\index.php:105
actionwp_headmodules\woocommerce\index.php:110
actionwp_footermodules\woocommerce\index.php:115
actionwp_dashboard_setupmodules\wp-dashboard-widget\index.php:15
actionadmin_menuopenmost-site-kit.php:68
actioninitopenmost-site-kit.php:71
Maintenance & Trust

Matomo Site Kit Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 10, 2026
PHP min version8.2
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Matomo Site Kit Developer Profile

Openmost

2 plugins · 80 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Matomo Site Kit

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/openmost-site-kit/build/index.asset.php

HTML / DOM Fingerprints

JS Globals
openmostSiteKit
REST Endpoints
/wp-json/openmost-site-kit/v1/settings/wp-json/openmost-site-kit/v1/options
FAQ

Frequently Asked Questions about Matomo Site Kit