Webmetic Security & Risk Analysis

wordpress.org/plugins/webmetic

Easily integrate Webmetic into your WordPress website by adding your Account ID.

20 active installs v1.0.2 PHP 7.2+ WP 5.2+ Updated Jul 4, 2025
b2bb2b-leadslead-generationleadinfoleads
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Webmetic Safe to Use in 2026?

Generally Safe

Score 100/100

Webmetic has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9mo ago
Risk Assessment

The 'webmetic' plugin v1.0.2 demonstrates a generally strong security posture based on the provided static analysis and vulnerability history. The absence of any identified CVEs and a clean vulnerability history are significant strengths, suggesting a commitment to security by the developers or a lack of past exploitation. The code analysis reveals a remarkably small attack surface, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code adheres to good practices by using prepared statements for all SQL queries and performing capability checks on the single identified entry point. The high percentage of properly escaped output is also a positive indicator, mitigating risks associated with cross-site scripting (XSS).

However, there are a couple of areas that warrant attention. The complete lack of nonce checks is a concern, especially if any of the identified entry points, despite not being explicitly listed as AJAX or REST, could potentially be triggered by user interaction without proper validation. While the capability check is present, the absence of nonces leaves open the possibility of CSRF (Cross-Site Request Forgery) vulnerabilities if these entry points handle sensitive operations. The taint analysis showing zero flows analyzed is also a weakness, as it implies incomplete or no dynamic analysis was performed, leaving potential vulnerabilities undiscovered. A more comprehensive dynamic analysis would be beneficial.

In conclusion, 'webmetic' v1.0.2 appears to be a relatively secure plugin with a minimal attack surface and good SQL hygiene. The primary weaknesses lie in the complete absence of nonce checks and the lack of taint flow analysis. While no past vulnerabilities have been recorded, the potential for CSRF and undiscovered issues due to limited dynamic analysis should be acknowledged. The plugin's strengths in preventing common web vulnerabilities like SQL injection and XSS are commendable.

Key Concerns

  • Missing nonce checks on entry points
  • No taint analysis performed
Vulnerabilities
None known

Webmetic Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Webmetic Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
8 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

89% escaped9 total outputs
Attack Surface

Webmetic Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuincludes\class-webmetic.php:56
actionadmin_initincludes\class-webmetic.php:57
Maintenance & Trust

Webmetic Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJul 4, 2025
PHP min version7.2
Downloads341

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Webmetic Developer Profile

webmetic

1 plugin · 20 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Webmetic

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
https://t.webmetic.de/iav.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Webmetic