VisitorLAB Security & Risk Analysis

wordpress.org/plugins/visitorlab

An analytics solution for websites to visualize how visitor act on it.

10 active installs v1.0.2 PHP 5.2.2+ WP 4.6+ Updated Jan 22, 2020
analyticserror-trackingheatmapsrecordingsvisitorlab
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is VisitorLAB Safe to Use in 2026?

Generally Safe

Score 85/100

VisitorLAB has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "visitorlab" v1.0.2 plugin exhibits a generally good security posture based on the provided static analysis. The absence of direct attack surface elements like AJAX handlers, REST API routes, shortcodes, and cron events, along with zero unsanitized taint flows and no recorded vulnerabilities, are positive indicators. The plugin also demonstrates good practices by utilizing prepared statements for its SQL queries and avoiding file operations and external HTTP requests in a way that might indicate immediate risk.

However, there are notable concerns. The complete lack of nonce checks and capability checks across any potential entry points is a significant weakness. While no direct entry points were identified in this analysis, any future expansion or undocumented functionality could be exploited without these fundamental WordPress security measures. Furthermore, a substantial portion of output (40%) is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if the data being output originates from user input or untrusted sources. The single external HTTP request, while not inherently malicious, warrants scrutiny for potential vulnerabilities related to insecurely handling responses or vulnerable endpoints.

Given the clean vulnerability history and the absence of critical issues in static analysis, the plugin is not currently considered high-risk. However, the identified weaknesses in output escaping and the complete absence of authentication and authorization checks on any potential future entry points represent areas of concern that could be exploited. Addressing these areas would significantly improve the plugin's overall security.

Key Concerns

  • 40% of output not properly escaped
  • No nonce checks found
  • No capability checks found
  • External HTTP request made
Vulnerabilities
None known

VisitorLAB Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

VisitorLAB Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

60% escaped10 total outputs
Attack Surface

VisitorLAB Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menuincludes\class-visitorlab.php:22
actionwp_footerincludes\class-visitorlab.php:65
actionadmin_enqueue_scriptsincludes\class-visitorlab.php:69
actionplugins_loadedvisitorlab.php:24
actionadmin_initvisitorlab.php:61
Maintenance & Trust

VisitorLAB Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedJan 22, 2020
PHP min version5.2.2
Downloads1K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

VisitorLAB Developer Profile

visitorlab

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect VisitorLAB

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/visitorlab/admin/static/visitorlab-admin.css
Version Parameters
visitorlab/style.css?ver=

HTML / DOM Fingerprints

Shortcode Output
visitorlab_script
FAQ

Frequently Asked Questions about VisitorLAB