User Insight WordPress Plugin Security & Risk Analysis

wordpress.org/plugins/user-insight

ヒートマップ対応アクセス解析ツールUser InsightのWordPressプラグインです。簡単な設定ですぐにUser Insightでデータを計測できるようになります。

200 active installs v1.0.5 PHP + WP + Updated Nov 2, 2021
analyticsanalyzeclickheatmapjapanese
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is User Insight WordPress Plugin Safe to Use in 2026?

Generally Safe

Score 85/100

User Insight WordPress Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "user-insight" v1.0.5 plugin exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The absence of any recorded CVEs, particularly critical or high-severity ones, is a significant positive indicator. Furthermore, the static analysis reveals a clean slate in terms of dangerous functions, raw SQL queries, and taint flows, suggesting developers have followed secure coding practices. The presence of nonce and capability checks, along with the exclusive use of prepared statements for SQL queries, are commendable security measures.

However, the static analysis does highlight a notable weakness: only 10% of output is properly escaped. This means that for every 10 output operations, 9 could potentially be vulnerable to cross-site scripting (XSS) attacks if the data originates from an untrusted source. While there are no explicit attack vectors like unauthenticated AJAX handlers or REST API routes, an XSS vulnerability could still be exploited in conjunction with other factors or within authenticated contexts. The lack of vulnerability history, while positive, could also be interpreted as a lack of extensive real-world security testing or historical scrutiny, making the current static analysis findings particularly important.

In conclusion, "user-insight" v1.0.5 demonstrates good foundational security practices, especially regarding SQL and taint analysis. The primary concern lies with the significantly low percentage of proper output escaping, which presents a tangible risk for XSS vulnerabilities. The absence of past vulnerabilities is reassuring, but the identified output escaping issue requires immediate attention to bolster the plugin's overall security.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

User Insight WordPress Plugin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

User Insight WordPress Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
1 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

10% escaped10 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
settingsPage (user_insight.php:72)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

User Insight WordPress Plugin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_footeruser_insight.php:26
actionadmin_menuuser_insight.php:27
Maintenance & Trust

User Insight WordPress Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedNov 2, 2021
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs200
Developer Profile

User Insight WordPress Plugin Developer Profile

userlocal

1 plugin · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect User Insight WordPress Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/user-insight/css/bootstrap.min.css
Script Paths
//cs.nakanohito.jp/b3/bi.js

HTML / DOM Fingerprints

CSS Classes
alert-successalert-danger
HTML Comments
<!-- User Insight PCDF Code Start : userlocal.jp --><!-- User Insight PCDF Code End : userlocal.jp --><!-- DO NOT ALTER BELOW THIS LINE --><!-- WITH FIRST PARTY COOKIE -->
Data Attributes
id="ui_analytics_id"name="analyticsId"id="update_ui_id"name="update_ui_id_nonce"id="ui_additional_tag"name="additionalTag"+2 more
JS Globals
_uic_uih_uic['uls']
FAQ

Frequently Asked Questions about User Insight WordPress Plugin