WP VisitorFlow Security & Risk Analysis

wordpress.org/plugins/wp-visitorflow

Detailed web analytics and visualization of your website's visitor flow.

100 active installs v1.6.2 PHP 5.5+ WP 3.5+ Updated Feb 8, 2021
analyticsstatisticsstatsvisitsweb-analytics
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP VisitorFlow Safe to Use in 2026?

Generally Safe

Score 85/100

WP VisitorFlow has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The wp-visitorflow plugin version 1.6.2 presents a moderate security risk primarily due to its unprotected entry points into the REST API. While the plugin has a clean vulnerability history with no known CVEs, the static analysis reveals significant concerns regarding data sanitization and authorization. The high percentage of REST API routes lacking permission callbacks (3 out of 3) exposes these endpoints to unauthenticated access, creating a substantial attack surface. Coupled with a concerning number of taint flows with unsanitized paths (7 out of 9), especially the 3 identified as high severity, there's a strong potential for attackers to inject malicious data or exploit logic flaws.

The plugin also shows weaknesses in output escaping, with only 8% of outputs being properly escaped. This, combined with the lack of nonce checks, further amplifies the risk of cross-site scripting (XSS) vulnerabilities. While the plugin doesn't utilize dangerous functions and has a reasonable number of capability checks, the identified issues with the REST API and unsanitized data flows are critical and require immediate attention. The absence of known vulnerabilities thus far is positive but does not negate the inherent risks identified in the code. Therefore, while the plugin demonstrates some good practices like using prepared statements for most SQL queries, the unprotected REST API and unsanitized taint flows represent significant weaknesses.

Key Concerns

  • REST API routes without permission callbacks
  • Taint flows with unsanitized paths (high severity)
  • Low percentage of properly escaped output
  • No nonce checks
Vulnerabilities
None known

WP VisitorFlow Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP VisitorFlow Code Analysis

Dangerous Functions
0
Raw SQL Queries
43
97 prepared
Unescaped Output
411
35 escaped
Nonce Checks
0
Capability Checks
20
File Operations
8
External Requests
0
Bundled Libraries
0

SQL Query Safety

69% prepared140 total queries

Output Escaping

8% escaped446 total outputs
Data Flows
7 unsanitized

Data Flow Analysis

9 flows7 with unsanitized paths
search_box (includes\classes\class-wp-list-table-wpvf.php:332)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
3 unprotected

WP VisitorFlow Attack Surface

Entry Points3
Unprotected3

REST API Routes 3

GET/wp-json/wp-visitorflow/v1/registerincludes\functions\wp-visitorflow-rest-api.php:9
GET/wp-json/wp-visitorflow/v1/statsincludes\functions\wp-visitorflow-rest-api.php:19
GET/wp-json/wp-visitorflow/v1/faviconincludes\functions\wp-visitorflow-rest-api.php:26
WordPress Hooks 13
actionadmin_footerincludes\classes\class-wp-list-table-wpvf.php:145
actionadmin_menuincludes\classes\class-wp-visitorflow-admin.php:34
actionwp_dashboard_setupincludes\classes\class-wp-visitorflow-admin.php:37
filterplugin_action_linksincludes\classes\class-wp-visitorflow-admin.php:40
filtermanage_posts_columnsincludes\classes\class-wp-visitorflow-admin.php:43
actionmanage_posts_custom_columnincludes\classes\class-wp-visitorflow-admin.php:44
filtermanage_pages_columnsincludes\classes\class-wp-visitorflow-admin.php:47
actionmanage_pages_custom_columnincludes\classes\class-wp-visitorflow-admin.php:48
actionadmin_noticeswp-visitorflow.php:58
actioninitwp-visitorflow.php:128
actionadmin_noticeswp-visitorflow.php:139
actionshutdownwp-visitorflow.php:151
actionwp_footerwp-visitorflow.php:156
Maintenance & Trust

WP VisitorFlow Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedFeb 8, 2021
PHP min version5.5
Downloads16K

Community Trust

Rating100/100
Number of ratings3
Active installs100
Developer Profile

WP VisitorFlow Developer Profile

Friese

2 plugins · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP VisitorFlow

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-visitorflow/includes/css/wp-visitorflow.css/wp-content/plugins/wp-visitorflow/includes/js/wp-visitorflow-frontend.js/wp-content/plugins/wp-visitorflow/includes/js/wp-visitorflow-backend.js
Script Paths
/wp-content/plugins/wp-visitorflow/includes/js/wp-visitorflow-frontend.js/wp-content/plugins/wp-visitorflow/includes/js/wp-visitorflow-backend.js
Version Parameters
wp-visitorflow/includes/css/wp-visitorflow.css?ver=wp-visitorflow/includes/js/wp-visitorflow-frontend.js?ver=wp-visitorflow/includes/js/wp-visitorflow-backend.js?ver=

HTML / DOM Fingerprints

CSS Classes
wp-visitorflow-overviewwpvf-frontend-scriptwpvf-backend-script
HTML Comments
<!-- WP VisitorFlow --><!-- END WP VisitorFlow --><!-- START WP VisitorFlow -->
Data Attributes
data-wpvf-post-iddata-wpvf-type
JS Globals
wp_visitorflow_data
REST Endpoints
/wp-json/wp-visitorflow/
FAQ

Frequently Asked Questions about WP VisitorFlow