
Freewheel Viewer Security & Risk Analysis
wordpress.org/plugins/autodesk-freewheel-viewerAdds a shotcode in order to easily view models from with Autodesk Freewheel
Is Freewheel Viewer Safe to Use in 2026?
Generally Safe
Score 85/100Freewheel Viewer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The autodesk-freewheel-viewer plugin version 1.0 exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, file operations, external HTTP requests, and the exclusive use of prepared statements for SQL queries indicate good coding practices. Furthermore, the complete lack of any recorded vulnerabilities or CVEs in its history is a significant positive indicator, suggesting a well-maintained and secure codebase over time.
However, a notable concern arises from the complete absence of nonce checks and capability checks. While the current attack surface (consisting of one shortcode) is small and has no apparent unauthenticated entry points according to the analysis, this lack of checks means that if any new entry points were introduced or if an existing one could be leveraged in an unexpected way, there would be no built-in protection against CSRF attacks or unauthorized actions. The taint analysis reporting zero flows is also a positive, but the fact that zero flows were analyzed might indicate a limitation in the analysis itself or a very simple plugin structure that doesn't expose complex data manipulation.
In conclusion, the plugin's current state is largely secure due to its minimal attack surface and adherence to safe coding practices for database interactions and output. The primary weakness lies in the missing security checks (nonces and capabilities) which, while not immediately exploitable given the current data, represent a potential vulnerability if the plugin evolves or if specific attack vectors are discovered. The vulnerability history is excellent, but the missing checks introduce a baseline risk.
Key Concerns
- Missing nonce checks
- Missing capability checks
Freewheel Viewer Security Vulnerabilities
Freewheel Viewer Code Analysis
Freewheel Viewer Attack Surface
Shortcodes 1
Maintenance & Trust
Freewheel Viewer Maintenance & Trust
Maintenance Signals
Community Trust
Freewheel Viewer Alternatives
Duplicate Page
duplicate-page
Duplicate Posts, Pages and Custom Posts easily using single click
Post Types Order
post-types-order
Sort posts and custom post type objects using a drag-and-drop, sortable JavaScript AJAX interface, or through the default WordPress dashboard
Intuitive Custom Post Order
intuitive-custom-post-order
Intuitively reorder Posts, Pages, Custom Post Types, Taxonomies, and Sites with a simple drag-and-drop interface.
WP Shortcodes Plugin — Shortcodes Ultimate
shortcodes-ultimate
A comprehensive collection of visual components for your site
Duplicate Post
copy-delete-posts
Duplicate post
Freewheel Viewer Developer Profile
3 plugins · 30 total installs
How We Detect Freewheel Viewer
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
<iframe scrolling="no" width="