Zamango Analytics Security & Risk Analysis

wordpress.org/plugins/zamango-analytics

Plugin to add Google Analytics tracker, GoStats tracker or different web tracker to each page on your weblog without making any changes to your templa …

10 active installs v1.0 PHP + WP 2.8.0+ Updated Apr 12, 2010
analyticscountergoogle-analyticsgostatspage-view-counter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Zamango Analytics Safe to Use in 2026?

Generally Safe

Score 85/100

Zamango Analytics has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "zamango-analytics" plugin v1.0 exhibits a strong adherence to security best practices in its static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in zero attack surface and zero unprotected entry points. The code signals also indicate a clean slate with no dangerous functions, file operations, or external HTTP requests. All SQL queries are prepared statements, and no vulnerabilities have been recorded in its history. This suggests a generally secure plugin with careful development.

However, a significant concern arises from the complete lack of output escaping. With 10 total outputs and 0% properly escaped, this plugin is highly susceptible to Cross-Site Scripting (XSS) vulnerabilities. Any data processed and displayed by the plugin, if not inherently sanitized by the WordPress core before reaching the plugin's output functions, could be exploited to inject malicious scripts. Furthermore, the absence of nonce and capability checks, while not directly exposed by the current static analysis (due to the zero attack surface), leaves potential for future or undiscovered vulnerabilities if new entry points are added without adequate security considerations. The lack of taint analysis results is also a minor concern, as it could indicate a lack of comprehensive testing for data flow vulnerabilities.

In conclusion, while "zamango-analytics" v1.0 demonstrates excellent baseline security by minimizing its attack surface and employing secure database practices, the critical flaw of unescaped output presents a substantial risk of XSS attacks. The plugin's vulnerability history is clean, which is positive, but the current code contains a readily exploitable weakness that needs immediate attention. Developers should prioritize implementing proper output escaping mechanisms.

Key Concerns

  • 0% output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Zamango Analytics Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Zamango Analytics Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped10 total outputs
Attack Surface

Zamango Analytics Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Zamango Analytics Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedApr 12, 2010
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Zamango Analytics Developer Profile

Zamango

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Zamango Analytics

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/zamango-analytics/zmg_analytics_admin.js
Version Parameters
zamango-analytics/zmg_analytics_admin.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- Zamango Analytics 1.0 -->
Data Attributes
id="zmg_analytics"name="gostats_server"name="gostats_id"name="gostats_brand"name="ga_id"name="counter"
FAQ

Frequently Asked Questions about Zamango Analytics