Freewheel Viewer Security & Risk Analysis

wordpress.org/plugins/autodesk-freewheel-viewer

Adds a shotcode in order to easily view models from with Autodesk Freewheel

10 active installs v1.0 PHP + WP 3.0.0+ Updated Oct 12, 2012
3dautodeskdwfposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Freewheel Viewer Safe to Use in 2026?

Generally Safe

Score 85/100

Freewheel Viewer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The autodesk-freewheel-viewer plugin version 1.0 exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, file operations, external HTTP requests, and the exclusive use of prepared statements for SQL queries indicate good coding practices. Furthermore, the complete lack of any recorded vulnerabilities or CVEs in its history is a significant positive indicator, suggesting a well-maintained and secure codebase over time.

However, a notable concern arises from the complete absence of nonce checks and capability checks. While the current attack surface (consisting of one shortcode) is small and has no apparent unauthenticated entry points according to the analysis, this lack of checks means that if any new entry points were introduced or if an existing one could be leveraged in an unexpected way, there would be no built-in protection against CSRF attacks or unauthorized actions. The taint analysis reporting zero flows is also a positive, but the fact that zero flows were analyzed might indicate a limitation in the analysis itself or a very simple plugin structure that doesn't expose complex data manipulation.

In conclusion, the plugin's current state is largely secure due to its minimal attack surface and adherence to safe coding practices for database interactions and output. The primary weakness lies in the missing security checks (nonces and capabilities) which, while not immediately exploitable given the current data, represent a potential vulnerability if the plugin evolves or if specific attack vectors are discovered. The vulnerability history is excellent, but the missing checks introduce a baseline risk.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Freewheel Viewer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Freewheel Viewer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Freewheel Viewer Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[freewheel] index.php:14
Maintenance & Trust

Freewheel Viewer Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedOct 12, 2012
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Freewheel Viewer Developer Profile

iphoenix

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Freewheel Viewer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<iframe scrolling="no" width="
FAQ

Frequently Asked Questions about Freewheel Viewer