Universal WP Lead Tracking Security & Risk Analysis

wordpress.org/plugins/universal-wp-lead-tracking

Adds lead tracking information to e-mails coming from Contact Form 7, Gravity Forms, Ninja Forms, or Elementor PRO form submissions.

100 active installs v1.0.9 PHP 5.4+ WP 3.3+ Updated Jul 14, 2025
contactemailformleadtracking
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Universal WP Lead Tracking Safe to Use in 2026?

Generally Safe

Score 100/100

Universal WP Lead Tracking has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8mo ago
Risk Assessment

The "universal-wp-lead-tracking" plugin v1.0.9 presents a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for its SQL queries and properly escaping nearly all of its output. It also includes nonce checks on its entry points and avoids making external HTTP requests, which are commendable security measures.

However, there are significant concerns highlighted by the static analysis. The presence of the `unserialize` function, particularly when combined with three identified flows with unsanitized paths, represents a critical risk. While no direct vulnerabilities were found in the taint analysis (critical/high severity), the potential for unserialize to lead to remote code execution or other serious vulnerabilities if user-controlled data is processed without proper sanitization is substantial. The absence of capability checks on its entry points is also a weakness, meaning that if any vulnerabilities were to be discovered in these handlers, they might be exploitable by unauthenticated users depending on the specific implementation.

The plugin's vulnerability history is clean, with no known CVEs. This suggests that, to date, it hasn't been a target or hasn't had publicly disclosed vulnerabilities. This is a positive indicator, but it doesn't negate the inherent risks identified in the code analysis. The lack of history could also mean the plugin hasn't been subjected to extensive security audits or is less widely used. Overall, while the plugin adheres to some best practices, the use of `unserialize` with unsanitized inputs and the lack of capability checks introduce significant potential security weaknesses that require careful consideration.

Key Concerns

  • Unsanitized paths with unserialize
  • Use of unserialize function
  • No capability checks on entry points
Vulnerabilities
None known

Universal WP Lead Tracking Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Universal WP Lead Tracking Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
4 prepared
Unescaped Output
1
46 escaped
Nonce Checks
2
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$session = unserialize($session_record['session_value']);universal-wp-lead-tracking.php:120
unserialize$session = unserialize($session_record['session_value']);universal-wp-lead-tracking.php:1041

SQL Query Safety

100% prepared4 total queries

Output Escaping

98% escaped47 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

4 flows3 with unsanitized paths
SaveAJAX (universal-wp-lead-tracking.php:524)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Universal WP Lead Tracking Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_UWPLT_SAVEuniversal-wp-lead-tracking.php:42
noprivwp_ajax_UWPLT_SET_LANDING_INFOuniversal-wp-lead-tracking.php:54
WordPress Hooks 9
actionadmin_menuuniversal-wp-lead-tracking.php:39
actioninituniversal-wp-lead-tracking.php:48
actionwp_headuniversal-wp-lead-tracking.php:51
filterninja_forms_action_email_messageuniversal-wp-lead-tracking.php:831
filtergform_pre_send_emailuniversal-wp-lead-tracking.php:841
filterwpcf7_mail_componentsuniversal-wp-lead-tracking.php:856
actionwp_headuniversal-wp-lead-tracking.php:867
filtergform_confirmationuniversal-wp-lead-tracking.php:959
actioninituniversal-wp-lead-tracking.php:973
Maintenance & Trust

Universal WP Lead Tracking Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJul 14, 2025
PHP min version5.4
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Universal WP Lead Tracking Developer Profile

Inbound Horizons

5 plugins · 270 total installs

93
trust score
Avg Security Score
98/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Universal WP Lead Tracking

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/universal-wp-lead-tracking/assets/js/UWPLT.js
Version Parameters
universal-wp-lead-tracking/assets/js/UWPLT.js?ver=

HTML / DOM Fingerprints

CSS Classes
panelpanel-marginpanel-body
Data Attributes
uwplt_nonceuwplt_gauwplt_gtaguwplt_custom_event_name
JS Globals
UWPLT_SAVEUWPLT_SET_LANDING_INFO
Shortcode Output
[tracking-info]
FAQ

Frequently Asked Questions about Universal WP Lead Tracking