Custom links in Elementor Image Carousel Security & Risk Analysis

wordpress.org/plugins/custom-links-in-elementor-image-carousel

Lets you add custom links in Elementor Image Carousel widget

5K active installs v1.1.1 PHP 7.2+ WP 5.2+ Updated Nov 9, 2022
custom-linkselementorimage-carousel
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Custom links in Elementor Image Carousel Safe to Use in 2026?

Generally Safe

Score 85/100

Custom links in Elementor Image Carousel has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The static analysis of the "custom-links-in-elementor-image-carousel" plugin version 1.1.1 reveals a generally good security posture with no identified critical vulnerabilities in the provided data. The absence of known CVEs and the complete use of prepared statements for SQL queries are positive indicators. However, a notable concern is the 50% rate of improperly escaped output, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not sanitized before being displayed. Additionally, the complete lack of capability checks and nonce checks, while not immediately leading to exploitable paths in this analysis, represents a potential weakness that could be leveraged in conjunction with other vulnerabilities or in future plugin versions.

The absence of any taint analysis findings and the lack of dangerous functions suggest that the plugin authors have taken steps to avoid common security pitfalls. The plugin also boasts a zero attack surface from AJAX, REST API, shortcodes, and cron events, which is excellent for reducing the potential for unauthorized access. The vulnerability history being completely clean is a strong positive signal, indicating a well-maintained and secure past. Despite these strengths, the unescaped output and the complete absence of nonces and capability checks are areas that warrant attention for improving the overall resilience of the plugin against potential attacks.

Key Concerns

  • Improperly escaped output
  • No capability checks
  • No nonce checks
Vulnerabilities
None known

Custom links in Elementor Image Carousel Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom links in Elementor Image Carousel Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped6 total outputs
Attack Surface

Custom links in Elementor Image Carousel Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterattachment_fields_to_editcustom-links-in-elementor-image-carousel.php:33
filterattachment_fields_to_savecustom-links-in-elementor-image-carousel.php:34
actionelementor/widget/render_contentcustom-links-in-elementor-image-carousel.php:35
Maintenance & Trust

Custom links in Elementor Image Carousel Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedNov 9, 2022
PHP min version7.2
Downloads22K

Community Trust

Rating94/100
Number of ratings25
Active installs5K
Developer Profile

Custom links in Elementor Image Carousel Developer Profile

Charlie Etienne

3 plugins · 14K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom links in Elementor Image Carousel

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
elementor-image-carousel-caption
Data Attributes
elementor_carousel_custom_linkelementor_carousel_custom_link_target
FAQ

Frequently Asked Questions about Custom links in Elementor Image Carousel