Visitas On-Line Security & Risk Analysis

wordpress.org/plugins/visitas-on-line

Easily record and view your website visits using the IPinfo API for precise geolocation.

10 active installs v2.0.1 PHP 8.4+ WP 6.9+ Updated Mar 20, 2026
geolocationstatisticstrackingvisitors
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Visitas On-Line Safe to Use in 2026?

Generally Safe

Score 100/100

Visitas On-Line has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The plugin "visitas-on-line" v2.0.1 exhibits a strong security posture in several key areas, including 100% proper output escaping, 100% prepared statement usage for SQL queries, and no use of dangerous functions. The lack of detected CVEs and common vulnerability types in its history further suggests a generally secure development practice. The plugin also demonstrates good security by incorporating nonce and capability checks where appropriate, and it has a remarkably small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without authentication. This suggests a low likelihood of direct exploitation through these common entry points.

However, the static analysis did reveal two flows with unsanitized paths. While these did not reach a critical or high severity in the taint analysis, they represent potential areas where user-supplied data could be mishandled if not properly validated and sanitized downstream. The presence of external HTTP requests, though only one, also warrants attention as it could be a vector for attacks if the target endpoint is compromised or the data sent is sensitive. Despite these minor concerns, the overall picture for "visitas-on-line" v2.0.1 is positive, indicating a well-secured plugin with a solid foundation, but with minor areas for improvement to achieve a truly robust security profile.

Key Concerns

  • Flows with unsanitized paths
  • External HTTP requests
Vulnerabilities
None known

Visitas On-Line Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Visitas On-Line Release Timeline

v2.0.1Current
v2.0.0
v1.0.0
Code Analysis
Analyzed Apr 16, 2026

Visitas On-Line Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
12 prepared
Unescaped Output
0
45 escaped
Nonce Checks
2
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared12 total queries

Output Escaping

100% escaped45 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
visitas_plugin_registro (visitas-on-line.php:49)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Visitas On-Line Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_enqueue_scriptsajustes.php:21
actionadmin_menuajustes.php:42
actionadmin_initajustes.php:98
actionwp_footervisitas-on-line.php:117
Maintenance & Trust

Visitas On-Line Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 20, 2026
PHP min version8.4
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Visitas On-Line Developer Profile

lidemar2020

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Visitas On-Line

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/visitas-on-line/css/plugin-style.css
Version Parameters
visitas-on-line/css/plugin-style.css?ver=

HTML / DOM Fingerprints

Data Attributes
name="visitas_ipinfo_api_key"value="<?php echo esc_attr( $visitas_token ); ?>"
FAQ

Frequently Asked Questions about Visitas On-Line