UserHeat Plugin Security & Risk Analysis

wordpress.org/plugins/userheat

Free heatmaps plugin for web analytics, on both PC and smartphone.

6K active installs v1.1.11 PHP 5.4+ WP 4.2+ Updated Apr 1, 2024
analyticsanalyzeclickheatmapjapanese
85
A · Safe
CVEs total1
Unpatched0
Last CVENov 7, 2023
Safety Verdict

Is UserHeat Plugin Safe to Use in 2026?

Generally Safe

Score 85/100

UserHeat Plugin has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Nov 7, 2023Updated 2yr ago
Risk Assessment

The "userheat" plugin v1.1.11 presents a mixed security posture. On the positive side, it demonstrates good practices in handling SQL queries, exclusively using prepared statements, and the static analysis shows no dangerous functions, file operations, external HTTP requests, or bundled libraries. Furthermore, there are no critical or high-severity taint flows identified, and all known CVEs appear to be patched. However, significant concerns arise from the complete lack of output escaping, meaning all 18 identified output points are vulnerable to Cross-Site Scripting (XSS) attacks. The absence of nonce checks and capability checks on all entry points, combined with a complete lack of output escaping, creates a substantial risk of Cross-Site Request Forgery (CSRF) and XSS vulnerabilities, especially if any of the entry points were to handle user-supplied data. The plugin's vulnerability history, while currently clear of unpatched issues, previously had a medium-severity vulnerability related to CSRF, which aligns with the potential risks identified in the code analysis due to missing CSRF protection mechanisms. This plugin has strengths in database interaction but exhibits critical weaknesses in output sanitization and input validation.

Key Concerns

  • Unescaped output on all 18 outputs
  • Missing nonce checks on all entry points
  • Missing capability checks on all entry points
  • 1 medium vulnerability in history (CSRF)
Vulnerabilities
1

UserHeat Plugin Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2023-47553medium · 4.3Cross-Site Request Forgery (CSRF)

UserHeat Plugin <= 1.1.10 - Cross-Site Request Forgery

Nov 7, 2023 Patched in 1.1.11 (438d)
Code Analysis
Analyzed Mar 16, 2026

UserHeat Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
18
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped18 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
settingPage (userheat.php:87)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

UserHeat Plugin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_inituserheat.php:35
actionadmin_menuuserheat.php:36
actionwp_footeruserheat.php:37
actioninituserheat.php:39
Maintenance & Trust

UserHeat Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedApr 1, 2024
PHP min version5.4
Downloads35K

Community Trust

Rating100/100
Number of ratings1
Active installs6K
Developer Profile

UserHeat Plugin Developer Profile

hayata

1 plugin · 6K total installs

69
trust score
Avg Security Score
85/100
Avg Patch Time
438 days
View full developer profile
Detection Fingerprints

How We Detect UserHeat Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/userheat/css/bootstrap.min.css/wp-content/plugins/userheat/css/site.css/wp-content/plugins/userheat/css/admin.css/wp-content/plugins/userheat/js/site.min.js
Script Paths
//uh.nakanohito.jp/uhj2/uh.js

HTML / DOM Fingerprints

CSS Classes
uh-css-bootstrapuh-css-siteuh-css-admin
HTML Comments
<!-- User Heat Tag --><!-- End User Heat Tag -->
JS Globals
UserHeatTag_uhtracker
FAQ

Frequently Asked Questions about UserHeat Plugin