
POD Marketing Analytics Security & Risk Analysis
wordpress.org/plugins/pod-marketing-analyticsThe easy way to integrate the Pod Marketing Analytics Portal to your website.
Is POD Marketing Analytics Safe to Use in 2026?
Generally Safe
Score 85/100POD Marketing Analytics has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The pod-marketing-analytics plugin, in version 0.2.17, exhibits significant security concerns primarily due to a lack of proper authentication and authorization checks across its exposed entry points. A substantial attack surface is presented with all 6 identified entry points (3 AJAX handlers and 3 REST API routes) lacking any authentication or permission checks. This means any unauthenticated user could potentially trigger these functions, leading to unintended actions or information disclosure.
The static analysis further reveals critical issues in taint analysis, with 3 flows identified as having unsanitized paths and classified as high severity. This indicates a strong potential for injection-type vulnerabilities, such as cross-site scripting (XSS) or path traversal, if user-supplied input is not adequately sanitized before being used in sensitive operations like file operations or SQL queries. The low percentage of properly escaped output (15%) exacerbates this risk, making it more likely for malicious data to be rendered directly in the browser or used insecurely.
Despite the concerning code analysis, the vulnerability history is clean, with no recorded CVEs. This suggests that either the plugin has not been extensively targeted or previous versions may not have contained exploitable flaws of a publicly known nature. However, the absence of past vulnerabilities should not be a cause for complacency, especially given the current security posture indicated by the static analysis. The plugin's strengths lie in the absence of dangerous functions and the presence of nonce checks, which are good security practices, though their effectiveness is undermined by the lack of overarching authorization. Overall, the plugin requires immediate attention to address the unauthenticated entry points and unsanitized data flows to mitigate severe security risks.
Key Concerns
- All AJAX handlers without auth checks
- All REST API routes without permission callbacks
- High severity unsanitized taint flows
- Low percentage of properly escaped output
- SQL queries with low prepared statement usage
- File operations present
- External HTTP requests present
POD Marketing Analytics Security Vulnerabilities
POD Marketing Analytics Code Analysis
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
POD Marketing Analytics Attack Surface
AJAX Handlers 3
REST API Routes 3
WordPress Hooks 32
Maintenance & Trust
POD Marketing Analytics Maintenance & Trust
Maintenance Signals
Community Trust
POD Marketing Analytics Developer Profile
1 plugin · 0 total installs
How We Detect POD Marketing Analytics
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/pod-marketing-analytics/gutenberg-blocks/dynamic-content-blocks/block.build.js/wp-content/plugins/pod-marketing-analytics/gutenberg-blocks/forms/block.build.js/wp-content/plugins/pod-marketing-analytics/gutenberg-blocks/storyboard/block.build.js/wp-content/plugins/pod-marketing-analytics/gutenberg-blocks/dynamic-content-blocks/block.build.js/wp-content/plugins/pod-marketing-analytics/gutenberg-blocks/forms/block.build.js/wp-content/plugins/pod-marketing-analytics/gutenberg-blocks/storyboard/block.build.jsHTML / DOM Fingerprints
data-block-iddata-form-iddata-storyboard-idactivedemand_blocksactivedemand_vendoractivedemand_formsactivedemand_storyboard[pod_block id='[pod_form id='[pod_storyboard id='