Universal WP Lead Tracking Security & Risk Analysis
wordpress.org/plugins/universal-wp-lead-trackingAdds lead tracking information to e-mails coming from Contact Form 7, Gravity Forms, Ninja Forms, or Elementor PRO form submissions.
Is Universal WP Lead Tracking Safe to Use in 2026?
Generally Safe
Score 100/100Universal WP Lead Tracking has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "universal-wp-lead-tracking" plugin v1.0.9 presents a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for its SQL queries and properly escaping nearly all of its output. It also includes nonce checks on its entry points and avoids making external HTTP requests, which are commendable security measures.
However, there are significant concerns highlighted by the static analysis. The presence of the `unserialize` function, particularly when combined with three identified flows with unsanitized paths, represents a critical risk. While no direct vulnerabilities were found in the taint analysis (critical/high severity), the potential for unserialize to lead to remote code execution or other serious vulnerabilities if user-controlled data is processed without proper sanitization is substantial. The absence of capability checks on its entry points is also a weakness, meaning that if any vulnerabilities were to be discovered in these handlers, they might be exploitable by unauthenticated users depending on the specific implementation.
The plugin's vulnerability history is clean, with no known CVEs. This suggests that, to date, it hasn't been a target or hasn't had publicly disclosed vulnerabilities. This is a positive indicator, but it doesn't negate the inherent risks identified in the code analysis. The lack of history could also mean the plugin hasn't been subjected to extensive security audits or is less widely used. Overall, while the plugin adheres to some best practices, the use of `unserialize` with unsanitized inputs and the lack of capability checks introduce significant potential security weaknesses that require careful consideration.
Key Concerns
- Unsanitized paths with unserialize
- Use of unserialize function
- No capability checks on entry points
Universal WP Lead Tracking Security Vulnerabilities
Universal WP Lead Tracking Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Universal WP Lead Tracking Attack Surface
AJAX Handlers 2
WordPress Hooks 9
Maintenance & Trust
Universal WP Lead Tracking Maintenance & Trust
Maintenance Signals
Community Trust
Universal WP Lead Tracking Alternatives
Lead info with country for Contact Form 7
contact-form-7-lead-info-with-country
Lead info with country for Contact Form 7 helps to track users that fill in forms.
LocaliQ – Tracking Code
reachedge
Adds LocaliQ's tracking code on all pages.
Contact Forms by Cimatti
contact-forms
Create and publish forms in your WordPress website with drag and drop. Contact forms, landing page forms, invitations, and more.
Omnisend for Contact Form 7 Add-On
omnisend-for-contact-form-7
Email Marketing, Newsletter, Email Automation, Forms, Pop Up, SMS by Omnisend
Email Marketing 4Dem
email-marketing-4dem
With this plugin you can integrate WordPress with your 4Dem Email Marketing platform keeping your users' data always perfectly synchronized with …
Universal WP Lead Tracking Developer Profile
5 plugins · 270 total installs
How We Detect Universal WP Lead Tracking
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/universal-wp-lead-tracking/assets/js/UWPLT.jsuniversal-wp-lead-tracking/assets/js/UWPLT.js?ver=HTML / DOM Fingerprints
panelpanel-marginpanel-bodyuwplt_nonceuwplt_gauwplt_gtaguwplt_custom_event_nameUWPLT_SAVEUWPLT_SET_LANDING_INFO[tracking-info]