
Auto iFrame Security & Risk Analysis
wordpress.org/plugins/auto-iframeA quick and easy shortcode to embed iframe's that resize to the content of the remote site.
Is Auto iFrame Safe to Use in 2026?
Generally Safe
Score 91/100Auto iFrame has a strong security track record. Known vulnerabilities have been patched promptly.
The 'auto-iframe' v2.0 plugin exhibits a mixed security posture. On the positive side, static analysis reveals good practices like 100% of SQL queries using prepared statements and 100% of outputs being properly escaped, indicating a strong defense against common injection and XSS vulnerabilities originating from direct code execution. The absence of dangerous functions, file operations, external HTTP requests, and taint analysis findings further suggests a relatively clean codebase in these areas. However, several concerns temper this positive outlook. The plugin has a history of known vulnerabilities, specifically two medium-severity Cross-Site Scripting (XSS) issues, with the most recent one being quite recent. While currently unpatched CVEs are zero, this history suggests potential recurring weaknesses in how user input is handled or neutralized, even if static analysis didn't flag specific issues in this version. The absence of nonce checks and capability checks on the single shortcode entry point is a significant concern, as it means any authenticated user could potentially trigger the shortcode's functionality without sufficient authorization, opening the door to abuse if the shortcode performs sensitive actions or manipulates data based on its attributes. The lack of critical or high-severity issues in static analysis and taint analysis is encouraging, but the past vulnerabilities and the current lack of authorization checks on its sole entry point represent the primary areas of risk for this plugin.
Key Concerns
- Medium severity CVEs in history (2)
- Missing nonce check on shortcode
- Missing capability check on shortcode
Auto iFrame Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
Auto iFrame <= 1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting
Auto iFrame <= 1.7 - Authenticated (Author+) Stored Cross-Site Scripting via tag Parameter
Auto iFrame Code Analysis
Output Escaping
Auto iFrame Attack Surface
Shortcodes 1
WordPress Hooks 1
Maintenance & Trust
Auto iFrame Maintenance & Trust
Maintenance Signals
Community Trust
Auto iFrame Alternatives
Advanced iFrame
advanced-iframe
Include content the way YOU like in an iframe that can hide and modify elements, does auto-height, forward parameters and does many, many more...
EWWW Image Optimizer
ewww-image-optimizer
Comprehensive image optimization that doesn't require a rocket science degree. Optimize images automatically for Faster Sites and Happy Visitors.
ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF
shortpixel-image-optimiser
Optimize images & PDFs smartly. Create and compress next-gen WebP and AVIF formats. Smart crop and resize.
Imsanity
imsanity
Automatically resizes huge image uploads. Are contributors uploading huge photos? Tired of manually resizing your images? Imsanity to the rescue!
Resize Image After Upload
resize-image-after-upload
Automatically resize your images after uploading using this plugin. Specify height&width, the plugin will do the rest quickly and transparently.
Auto iFrame Developer Profile
34 plugins · 8K total installs
How We Detect Auto iFrame
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/auto-iframe/icon.png/wp-content/plugins/auto-iframe/auto-iframe.jsHTML / DOM Fingerprints
Auto iFrame shortcode is in the format of:Where:link = the url of the source for the iFrame. REQUIRED.tag = a unique identifier in case you want more than one iFrame on a page. Default = auto-iframe.+32 moreidnamesrcwidthheightframeborder+2 morejQueryAutoiFrameAdjustiFrameHeight<iframe id="