PLX Lead Reporting Security & Risk Analysis

wordpress.org/plugins/plx-reporting

Speeds up Google Tag Manager integration and provides dataLayer functions for Contact Form 7 integration.

200 active installs v2.1 PHP 7.4+ WP + Updated Feb 20, 2023
cf7contact-form-7google-tag-managergtmtag-manager
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is PLX Lead Reporting Safe to Use in 2026?

Generally Safe

Score 85/100

PLX Lead Reporting has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The 'plx-reporting' plugin v2.1 exhibits a mixed security posture. On the positive side, the static analysis reveals no known CVEs in its history and no critical or high-severity taint flows, suggesting a generally safe codebase in terms of known historical vulnerabilities and immediate data-flow risks. The complete absence of external HTTP requests and the 100% use of prepared statements for SQL queries are excellent security practices, significantly reducing the risk of common web attack vectors like SSRF and SQL injection.

However, several areas raise concerns. The low percentage of properly escaped output (38%) is a significant weakness, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. With 112 total outputs, a substantial number are likely vulnerable to attack if user-supplied data is not adequately sanitized before being displayed. Furthermore, the complete lack of nonce checks and capability checks, coupled with zero unprotected entry points, is perplexing. While this might indicate a very small attack surface or that all entry points are intended to be public, it's unusual and warrants further investigation. If there are any hidden or overlooked entry points, their lack of authentication and authorization checks would be a critical flaw.

In conclusion, 'plx-reporting' v2.1 benefits from good practices in its handling of database queries and external requests, and it has no documented historical vulnerabilities. The primary and most significant weakness is the widespread lack of output escaping, posing a clear XSS risk. The absence of auth checks on entry points, while seemingly zero-attack-surface, could be an indicator of an incomplete analysis or a potential blind spot if not all entry points were identified.

Key Concerns

  • Low output escaping percentage (38%)
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

PLX Lead Reporting Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

PLX Lead Reporting Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
69
43 escaped
Nonce Checks
0
Capability Checks
0
File Operations
4
External Requests
0
Bundled Libraries
0

Output Escaping

38% escaped112 total outputs
Attack Surface

PLX Lead Reporting Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionadmin_menuadmin\settings.php:10
actionadmin_initadmin\settings.php:82
actionadmin_noticesadmin\settings.php:298
actionwp_headincludes\add-code-to-head-and-body.php:10
actionwp_body_openincludes\add-code-to-head-and-body.php:60
filterwpcf7_form_hidden_fieldsincludes\cf7\cf7-hidden-fields.php:22
filterwpcf7_editor_panelsincludes\cf7\cf7-tab.php:11
actionsave_postincludes\cf7\cf7-tab.php:87
actionwp_enqueue_scriptsincludes\dataLayer.functions.php:25
actionwp_enqueue_scriptsincludes\enqueue.php:16
actionadmin_enqueue_scriptsincludes\enqueue.php:29
actionwp_headincludes\gtmhead.functions.php:27
actionadmin_initincludes\settings.init.php:34
Maintenance & Trust

PLX Lead Reporting Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedFeb 20, 2023
PHP min version7.4
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs200
Developer Profile

PLX Lead Reporting Developer Profile

Webmaster

3 plugins · 430 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PLX Lead Reporting

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/plx-reporting/public/public.js/wp-content/plugins/plx-reporting/admin/admin.css/wp-content/plugins/plx-reporting/admin/admin.js
Script Paths
/wp-content/plugins/plx-reporting/js/plxreporting.js
Version Parameters
plx_reporting_client_scriptplx_reporting_admin_stylesplx_reporting_admin_script

HTML / DOM Fingerprints

HTML Comments
<!-- Google Tag Manager (noscript) --><!-- End Google Tag Manager (noscript) -->
Data Attributes
data-plx-reporting
JS Globals
window.plx_reporting_tag_manager_idwindow.plx_reporting_add_header_and_body_codedataLayer.push({ 'event': 'plx_form'window.plx_reporting_setting_injwindow.plx_reporting_setting_GTMID
Shortcode Output
<input type="hidden" name="_plx_reporting_form_title" value="
FAQ

Frequently Asked Questions about PLX Lead Reporting