Woo Dynamic Remarketing Security & Risk Analysis

wordpress.org/plugins/woo-dynamic-re-marketing

This plugin automatically inserts the required tags for Google Dynamic Remarketing (DYNX).

100 active installs v2.2 PHP + WP 3.5+ Updated Mar 10, 2017
adwordsdynamicremarketing
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Woo Dynamic Remarketing Safe to Use in 2026?

Generally Safe

Score 85/100

Woo Dynamic Remarketing has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "woo-dynamic-re-marketing" plugin v2.2 exhibits a generally positive security posture based on the static analysis. The absence of any known vulnerabilities in its history is a significant strength, suggesting a history of secure development or a lack of public discovery of issues. Furthermore, the complete absence of dangerous functions, external HTTP requests, and the use of prepared statements for all SQL queries are excellent security practices. The plugin also correctly handles file operations and does not bundle any external libraries, reducing the risk of inheriting vulnerabilities from third-party code.

However, there are a few areas that warrant attention. The static analysis reveals a concerning lack of output escaping, with only 15% of outputs being properly escaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled correctly before being displayed to users. Additionally, the plugin has zero nonces and zero capability checks. While the attack surface is reported as zero, the absence of these fundamental security mechanisms could be a concern if any entry points are inadvertently introduced or if permissions are not strictly enforced at a higher level.

Overall, the plugin demonstrates a good foundation for security by avoiding common pitfalls like raw SQL and dangerous functions. The lack of historical vulnerabilities is a strong indicator of a secure past. Nevertheless, the low percentage of properly escaped output and the complete absence of nonces and capability checks present potential risks that should be addressed to further strengthen the plugin's security.

Key Concerns

  • Low output escaping percentage
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Woo Dynamic Remarketing Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Woo Dynamic Remarketing Release Timeline

v2.2Current
v2.1
v2.0
Code Analysis
Analyzed Mar 16, 2026

Woo Dynamic Remarketing Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
11
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

15% escaped13 total outputs
Attack Surface

Woo Dynamic Remarketing Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuoptions.php:25
actionadmin_initoptions.php:26
actionwp_footeroptions.php:151
Maintenance & Trust

Woo Dynamic Remarketing Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.33
Last updatedMar 10, 2017
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

Woo Dynamic Remarketing Developer Profile

Sinaps Marketing

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Woo Dynamic Remarketing

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
woo-dynamic-re-marketing/woo-dynamic-re-marketing.php?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Woo Dynamic Remarketing