TWIPLA (Visitor Analytics IO) – Privacy-First Website Stats, Session Recordings, Heatmaps, Polls and Surveys Security & Risk Analysis

wordpress.org/plugins/visitor-analytics-io

2.5M+ installs — #1 Web Analytics Tool on WIX, now on WordPress! 📈 Traffic Stats, Session Replays, Heatmaps.🔓 GDPR & CCPA Ready. 💵 Free Forever Plan.

1K active installs v1.3.0 PHP 5.6+ WP 4.0+ Updated May 7, 2025
analyticsstatisticswebsite-analyticswebsite-statisticswebsite-tracking
99
A · Safe
CVEs total1
Unpatched0
Last CVEApr 10, 2024
Download
Safety Verdict

Is TWIPLA (Visitor Analytics IO) – Privacy-First Website Stats, Session Recordings, Heatmaps, Polls and Surveys Safe to Use in 2026?

Generally Safe

Score 99/100

TWIPLA (Visitor Analytics IO) – Privacy-First Website Stats, Session Recordings, Heatmaps, Polls and Surveys has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Apr 10, 2024Updated 11mo ago
Risk Assessment

The visitor-analytics-io plugin version 1.3.0 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by not exposing direct entry points like AJAX handlers, REST API routes, or shortcodes, and it utilizes prepared statements for all its SQL queries, significantly mitigating SQL injection risks. The absence of bundled libraries also reduces the attack surface from outdated third-party components.

However, several concerning aspects are highlighted in the static analysis. A significant portion (93%) of its 55 output operations are not properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the taint analysis reveals one flow with an unsanitized path, although it is not classified as critical or high severity in this instance. The lack of nonce checks and capability checks on potential, albeit currently zero, entry points is also a weakness. The plugin's vulnerability history shows a past medium severity XSS vulnerability, which reinforces the concern about unescaped output.

In conclusion, while the plugin avoids common pitfalls like direct SQL injection and a large attack surface, the prevalent lack of output escaping is a major security concern that could lead to XSS attacks. The past vulnerability further underscores the need for rigorous output sanitization. The absence of any authenticated entry points in this version is a strength, but the underlying code should be thoroughly audited for proper output handling to ensure robust security.

Key Concerns

  • High percentage of unescaped output
  • Flow with unsanitized path detected
  • No nonce checks implemented
  • No capability checks implemented
  • Past medium severity vulnerability (XSS)
Vulnerabilities
1

TWIPLA (Visitor Analytics IO) – Privacy-First Website Stats, Session Recordings, Heatmaps, Polls and Surveys Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-31937medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

TWIPLA (Visitor Analytics IO) <= 1.2.0 - Authenticated (Admin+) Stored Cross-Site Scripting

Apr 10, 2024 Patched in 1.3.0 (7d)
Code Analysis
Analyzed Mar 16, 2026

TWIPLA (Visitor Analytics IO) – Privacy-First Website Stats, Session Recordings, Heatmaps, Polls and Surveys Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
51
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

7% escaped55 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<settings> (admin\views\settings.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

TWIPLA (Visitor Analytics IO) – Privacy-First Website Stats, Session Recordings, Heatmaps, Polls and Surveys Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_menuincludes\class-visitoranalytics.php:66
actionwp_footerincludes\class-visitoranalytics.php:124
actionadmin_enqueue_scriptsincludes\class-visitoranalytics.php:130
actionadmin_enqueue_scriptsincludes\class-visitoranalytics.php:143
actionplugins_loadedvisitor-analytics-io.php:21
filterauto_plugin_update_send_emailvisitor-analytics-io.php:31
actionadmin_initvisitor-analytics-io.php:71
filterplugin_row_metavisitor-analytics-io.php:76
Maintenance & Trust

TWIPLA (Visitor Analytics IO) – Privacy-First Website Stats, Session Recordings, Heatmaps, Polls and Surveys Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedMay 7, 2025
PHP min version5.6
Downloads23K

Community Trust

Rating92/100
Number of ratings18
Active installs1K
Developer Profile

TWIPLA (Visitor Analytics IO) – Privacy-First Website Stats, Session Recordings, Heatmaps, Polls and Surveys Developer Profile

Visitor Analytics

1 plugin · 1K total installs

99
trust score
Avg Security Score
99/100
Avg Patch Time
7 days
View full developer profile
Detection Fingerprints

How We Detect TWIPLA (Visitor Analytics IO) – Privacy-First Website Stats, Session Recordings, Heatmaps, Polls and Surveys

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/visitor-analytics-io/admin/static/css/admin.css

HTML / DOM Fingerprints

HTML Comments
START: VISA Tracking CodeEND: VISA Tracking Code
JS Globals
window.va
Shortcode Output
<!-- START: VISA Tracking Code --><script>(function(v,i,s,a,t){v[t]=v[t]||function(){(v[t].v=v[t].v||[]).push(arguments)};if(!v._visaSettings){v._visaSettings={}}v._visaSettings[a]={v:'1.0',s:a,a:'1',t:t};var b=i.getElementsByTagName('body')[0];var p=i.createElement('script');p.defer=1;p.async=1;p.src=s+'?s='+a;b.appendChild(p)})(window,document,'//app-worker.visitor-analytics.io/main.js','
FAQ

Frequently Asked Questions about TWIPLA (Visitor Analytics IO) – Privacy-First Website Stats, Session Recordings, Heatmaps, Polls and Surveys