Auto iFrame Security & Risk Analysis

wordpress.org/plugins/auto-iframe

A quick and easy shortcode to embed iframe's that resize to the content of the remote site.

4K active installs v2.0 PHP + WP 3.0+ Updated Dec 2, 2024
iframeresize
91
A · Safe
CVEs total2
Unpatched0
Last CVEDec 18, 2024
Safety Verdict

Is Auto iFrame Safe to Use in 2026?

Generally Safe

Score 91/100

Auto iFrame has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Dec 18, 2024Updated 1yr ago
Risk Assessment

The 'auto-iframe' v2.0 plugin exhibits a mixed security posture. On the positive side, static analysis reveals good practices like 100% of SQL queries using prepared statements and 100% of outputs being properly escaped, indicating a strong defense against common injection and XSS vulnerabilities originating from direct code execution. The absence of dangerous functions, file operations, external HTTP requests, and taint analysis findings further suggests a relatively clean codebase in these areas. However, several concerns temper this positive outlook. The plugin has a history of known vulnerabilities, specifically two medium-severity Cross-Site Scripting (XSS) issues, with the most recent one being quite recent. While currently unpatched CVEs are zero, this history suggests potential recurring weaknesses in how user input is handled or neutralized, even if static analysis didn't flag specific issues in this version. The absence of nonce checks and capability checks on the single shortcode entry point is a significant concern, as it means any authenticated user could potentially trigger the shortcode's functionality without sufficient authorization, opening the door to abuse if the shortcode performs sensitive actions or manipulates data based on its attributes. The lack of critical or high-severity issues in static analysis and taint analysis is encouraging, but the past vulnerabilities and the current lack of authorization checks on its sole entry point represent the primary areas of risk for this plugin.

Key Concerns

  • Medium severity CVEs in history (2)
  • Missing nonce check on shortcode
  • Missing capability check on shortcode
Vulnerabilities
2

Auto iFrame Security Vulnerabilities

CVEs by Year

2 CVEs in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2024-10151medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Auto iFrame <= 1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting

Dec 18, 2024 Patched in 2.0 (34d)
CVE-2024-9449medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Auto iFrame <= 1.7 - Authenticated (Author+) Stored Cross-Site Scripting via tag Parameter

Oct 8, 2024 Patched in 1.8 (1d)
Code Analysis
Analyzed Mar 16, 2026

Auto iFrame Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
9 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped9 total outputs
Attack Surface

Auto iFrame Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[auto-iframe] auto-iframe.php:15
WordPress Hooks 1
actioninitauto-iframe.php:12
Maintenance & Trust

Auto iFrame Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedDec 2, 2024
PHP min version
Downloads88K

Community Trust

Rating72/100
Number of ratings18
Active installs4K
Developer Profile

Auto iFrame Developer Profile

Greg Ross

34 plugins · 8K total installs

80
trust score
Avg Security Score
88/100
Avg Patch Time
39 days
View full developer profile
Detection Fingerprints

How We Detect Auto iFrame

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/auto-iframe/icon.png
Script Paths
/wp-content/plugins/auto-iframe/auto-iframe.js

HTML / DOM Fingerprints

HTML Comments
Auto iFrame shortcode is in the format of:Where:link = the url of the source for the iFrame. REQUIRED.tag = a unique identifier in case you want more than one iFrame on a page. Default = auto-iframe.+32 more
Data Attributes
idnamesrcwidthheightframeborder+2 more
JS Globals
jQueryAutoiFrameAdjustiFrameHeight
Shortcode Output
<iframe id="
FAQ

Frequently Asked Questions about Auto iFrame