WP TagMan Security & Risk Analysis

wordpress.org/plugins/wp-tagman

This is a simple plugin that allows you to insert the Google Tag Manager container into your site.

10 active installs v1.0.0 PHP + WP 4.0.4+ Updated Oct 28, 2021
google-analyticsgoogle-tag-managermarketingtrackingtrafficking
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP TagMan Safe to Use in 2026?

Generally Safe

Score 85/100

WP TagMan has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "wp-tagman" v1.0.0 plugin exhibits a generally positive security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface, and notably, there are no unprotected entry points identified. The code signals also indicate good practices in handling SQL queries, as all are using prepared statements, and there are no detected file operations or external HTTP requests, further reducing potential risks. The plugin also implements capability checks for all identified code flows.

However, a significant concern is the complete lack of output escaping. With 4 total outputs and 0% properly escaped, this presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Any data processed and displayed by the plugin without proper sanitization could be exploited by attackers. The absence of taint analysis results and vulnerability history suggests the plugin may not have been subjected to rigorous security testing or that no vulnerabilities have been publicly disclosed to date. This, combined with the lack of nonce checks, leaves room for potential Cross-Site Request Forgery (CSRF) attacks if functionality were to be added later that modifies data.

In conclusion, while "wp-tagman" v1.0.0 demonstrates a commendably small attack surface and secure handling of database queries, the critical deficiency in output escaping is a major security weakness that needs immediate attention. The lack of historical vulnerabilities is a positive sign but should not be relied upon as a guarantee of future security, especially given the identified code weaknesses. Developers should prioritize implementing proper output escaping for all dynamic content displayed to users.

Key Concerns

  • Outputs not properly escaped
  • No nonce checks
Vulnerabilities
None known

WP TagMan Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP TagMan Release Timeline

v1.0.0Current
v0.1
Code Analysis
Analyzed Mar 17, 2026

WP TagMan Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

WP TagMan Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwp_footerwp-tagman.php:60
actionadmin_menuwp-tagman.php:61
actionadmin_initwp-tagman.php:62
filterplugin_action_linkswp-tagman.php:63
actionplugins_loadedwp-tagman.php:155
Maintenance & Trust

WP TagMan Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedOct 28, 2021
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP TagMan Developer Profile

Adam Ainsworth

4 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP TagMan

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
//www.googletagmanager.com/gtm.js?id=

HTML / DOM Fingerprints

HTML Comments
<!-- Google Tag Manager --><!-- End Google Tag Manager -->
Data Attributes
id="wp-tagman-script"
JS Globals
window.dataLayer
FAQ

Frequently Asked Questions about WP TagMan