Site visitor Information Security & Risk Analysis

wordpress.org/plugins/site-visitor-info

Block Visitor to Access the Website and Redirects visitors to a predefined URL using IP address.

0 active installs v1.0 PHP + WP 3.0+ Updated Sep 9, 2018
ip-addressip-based-block-visitorip-based-redirectiontargeted-content
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Site visitor Information Safe to Use in 2026?

Generally Safe

Score 85/100

Site visitor Information has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "site-visitor-info" v1.0 plugin exhibits significant security concerns despite having a seemingly small attack surface and no known historical vulnerabilities. While the absence of AJAX handlers, REST API routes, shortcodes, and cron events reduces direct entry points, the code analysis reveals critical weaknesses in data handling. Specifically, 100% of SQL queries are not using prepared statements, which is a major risk for SQL injection vulnerabilities. Furthermore, all four analyzed taint flows indicate unsanitized paths with high severity, suggesting that user-supplied data is not being properly validated or escaped before being used in sensitive operations, likely related to the SQL queries.

The plugin's output escaping is also a concern, with only 33% of outputs properly escaped, leaving potential for cross-site scripting (XSS) vulnerabilities. The complete lack of nonce and capability checks on any potential entry points, although currently not exposed by the static analysis, means that if any were introduced or discovered, they would be unprotected. The vulnerability history showing no past issues is a positive sign, but it does not mitigate the severe flaws identified in the current codebase. The overall security posture is poor due to the combination of unescaped data, raw SQL queries, and high-severity taint flows, outweighing the benefit of a limited attack surface and clean history.

Key Concerns

  • Raw SQL queries without prepared statements
  • High severity taint flows with unsanitized paths
  • Low percentage of properly escaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Site visitor Information Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Site visitor Information Release Timeline

No version history available.
Code Analysis
Analyzed Apr 6, 2026

Site visitor Information Code Analysis

Dangerous Functions
0
Raw SQL Queries
7
0 prepared
Unescaped Output
2
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared7 total queries

Output Escaping

33% escaped3 total outputs
Data Flows · Security
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
svi_site_visitor_html_page (sitevisitor.php:56)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Site visitor Information Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menusitevisitor.php:20
actioninitsitevisitor.php:34
Maintenance & Trust

Site visitor Information Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedSep 9, 2018
PHP min version
Downloads963

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Site visitor Information Developer Profile

usmanaltafwp

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Site visitor Information

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
site_visitedwrap
Data Attributes
name="redirect"name="user_ip"name="block"name="unblock"name="submit"type="text"+5 more
FAQ

Frequently Asked Questions about Site visitor Information