
Walnut.Marketing Portal Security & Risk Analysis
wordpress.org/plugins/walnutmarketingAdds the Walnut.Marketing Portal tracking script to your website
Is Walnut.Marketing Portal Safe to Use in 2026?
Generally Safe
Score 85/100Walnut.Marketing Portal has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'walnutmarketing' plugin v0.2.05 presents a mixed security posture. On the positive side, it demonstrates good practices by using prepared statements for all SQL queries and includes nonce checks for its AJAX handlers. There is also no recorded vulnerability history, suggesting a generally stable codebase. However, significant concerns arise from the static analysis. A substantial attack surface is exposed, with all three identified AJAX handlers lacking authentication checks. Furthermore, the analysis indicates that none of the 24 identified output points are properly escaped, creating a high risk of cross-site scripting (XSS) vulnerabilities. The single unsanitized path identified in the taint analysis also warrants attention, although its severity is not specified as critical or high. The lack of capability checks on the AJAX handlers, combined with unescaped output, creates a dangerous combination where unauthenticated users could potentially inject malicious scripts that execute within the context of other users' browsers.
Despite the lack of historical CVEs, the identified weaknesses in current code analysis are serious. The absence of authentication on AJAX endpoints and the pervasive lack of output escaping represent fundamental security flaws that could be easily exploited. While the use of prepared statements for SQL is commendable, it does not mitigate the risks posed by XSS or unauthorized actions through unprotected AJAX endpoints. The plugin's strengths lie in its SQL handling and nonce implementation, but these are overshadowed by the critical vulnerabilities in authentication and output sanitization. Immediate remediation is advised to address these critical security gaps.
Key Concerns
- AJAX handlers without auth checks
- Unescaped output across all outputs
- Unsanitized path in taint analysis
Walnut.Marketing Portal Security Vulnerabilities
Walnut.Marketing Portal Code Analysis
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
Walnut.Marketing Portal Attack Surface
AJAX Handlers 3
WordPress Hooks 29
Maintenance & Trust
Walnut.Marketing Portal Maintenance & Trust
Maintenance Signals
Community Trust
Walnut.Marketing Portal Alternatives
Walnut.Marketing Portal Developer Profile
2 plugins · 1K total installs
How We Detect Walnut.Marketing Portal
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/walnutmarketing/gutenberg-blocks/dynamic-content-blocks/block.build.js/wp-content/plugins/walnutmarketing/gutenberg-blocks/forms/block.build.jshttps://api.activedemand.com/v1/smart_blocks.jsonhttps://api.activedemand.com/v1/forms.jsonHTML / DOM Fingerprints
activedemand_blocksactivedemand_forms[activedemand_block[activedemand_form