LocaliQ – Tracking Code Security & Risk Analysis

wordpress.org/plugins/reachedge

Adds LocaliQ's tracking code on all pages.

2K active installs v1.9.1 PHP + WP 2.7+ Updated May 20, 2024
call-trackingemail-trackingform-trackinglead-conversionlocaliq
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is LocaliQ – Tracking Code Safe to Use in 2026?

Generally Safe

Score 92/100

LocaliQ – Tracking Code has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "reachedge" plugin version 1.9.1 exhibits a generally strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the static analysis did not uncover any dangerous functions, raw SQL queries, file operations, external HTTP requests, or taint flows, all of which are positive indicators of secure coding practices. The lack of vulnerability history, including known CVEs, also suggests a history of relative security, although this could also be due to a lack of thorough past analysis or reporting.

However, a notable concern arises from the output escaping results. With 100% of the outputs not being properly escaped, this presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic content rendered by the plugin without proper sanitization or escaping is vulnerable to malicious injection. While the attack surface is small and the plugin avoids many common pitfalls, this single area of weakness needs immediate attention to mitigate potential XSS attacks. The lack of nonce and capability checks on entry points (though there are no identified entry points in this analysis) would also be a concern if any were discovered.

Key Concerns

  • Output is not properly escaped
Vulnerabilities
None known

LocaliQ – Tracking Code Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

LocaliQ – Tracking Code Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

LocaliQ – Tracking Code Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menureachedge-tracking-plugin-settings.php:3
actionadmin_initreachedge-tracking-plugin-settings.php:4
actionwp_headreachedge-tracking-plugin.php:32
Maintenance & Trust

LocaliQ – Tracking Code Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedMay 20, 2024
PHP min version
Downloads28K

Community Trust

Rating60/100
Number of ratings2
Active installs2K
Developer Profile

LocaliQ – Tracking Code Developer Profile

REWordPressPlugin

2 plugins · 2K total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect LocaliQ – Tracking Code

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/reachedge/reachedge-tracking-plugin.php

HTML / DOM Fingerprints

Shortcode Output
//cdn.rlets.com/capture_configs/
FAQ

Frequently Asked Questions about LocaliQ – Tracking Code