Awesome YouTube Embed Security & Risk Analysis

wordpress.org/plugins/awesome-youtube-embed

Hide Annoying YouTube suggested, recommended, related videos

10 active installs v1.0 PHP + WP 3.6+ Updated Mar 24, 2016
hiderecommendedrelatedsuggestedyoutube
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Awesome YouTube Embed Safe to Use in 2026?

Generally Safe

Score 85/100

Awesome YouTube Embed has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "awesome-youtube-embed" v1.0 plugin exhibits a strong security posture based on the provided static analysis. The complete absence of identifiable entry points like AJAX handlers, REST API routes, shortcodes, and cron events significantly reduces the plugin's attack surface. Furthermore, the code signals are positive, with no dangerous functions identified, all SQL queries utilizing prepared statements (or at least 50% doing so, which is still a good start), and 100% of outputs being properly escaped. The lack of file operations, external HTTP requests, nonce checks, and capability checks (while notable, could also indicate limited functionality or reliance on external handlers not visible in this scope) contribute to a seemingly secure code base. The taint analysis showing zero flows with unsanitized paths, and zero critical or high severity issues, further reinforces this impression. The vulnerability history is also clean, with no recorded CVEs, which suggests a history of secure development or timely patching if issues have arisen previously. However, the complete absence of nonce checks and capability checks, while not directly indicative of a vulnerability in this isolated analysis, is a concern if the plugin has any user-facing interaction or administrative functions that are not immediately apparent. This could suggest a potential for privilege escalation or cross-site request forgery if such functionality exists but is not covered by these security measures.

Key Concerns

  • No nonce checks identified
  • No capability checks identified
  • 50% of SQL queries not using prepared statements
Vulnerabilities
None known

Awesome YouTube Embed Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Awesome YouTube Embed Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
2 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

50% prepared4 total queries
Attack Surface

Awesome YouTube Embed Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filteroembed_resultyoutube-embed-for-wp.php:12
filterplugin_action_linksyoutube-embed-for-wp.php:28
actionadmin_noticesyoutube-embed-for-wp.php:46
Maintenance & Trust

Awesome YouTube Embed Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedMar 24, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Awesome YouTube Embed Developer Profile

Cobbysoft

4 plugins · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Awesome YouTube Embed

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Awesome YouTube Embed