dtSlider Security & Risk Analysis

wordpress.org/plugins/dtslider

Quick and easy shortcode implementation of Niall Doherty's Coda-Slider 2.0 http://www.ndoherty.biz/. Works with anything queryable in wordpress i …

10 active installs v1.2 PHP + WP + Updated Mar 2, 2011
coda-sliderjqueryslideshow
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is dtSlider Safe to Use in 2026?

Generally Safe

Score 85/100

dtSlider has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The static analysis of the "dtslider" v1.2 plugin reveals a seemingly strong security posture. There are no identified attack surface entry points such as AJAX handlers, REST API routes, shortcodes, or cron events that lack authorization checks. Furthermore, the code demonstrates good security practices by not utilizing dangerous functions, performing all SQL queries using prepared statements, and properly escaping all output. File operations and external HTTP requests are also absent, further reducing the potential for external manipulation. The absence of taint analysis findings indicates no detected flows with unsanitized paths.

Despite these positive findings, a notable concern is the complete absence of nonce checks and capability checks. While the current lack of identifiable entry points might make this less immediately critical, it represents a significant gap in security controls. Should any entry points be introduced or discovered in future versions without these checks, the plugin would be highly vulnerable to CSRF and privilege escalation attacks. The bundled jQuery v1.3.2 library is also outdated and presents a potential risk if any of its known vulnerabilities are exploitable within the plugin's context. The vulnerability history being entirely clear is positive, suggesting a history of secure development or limited exposure, but this should not overshadow the identified code-level risks.

In conclusion, "dtslider" v1.2 exhibits strengths in its current minimal attack surface and adherence to prepared statements and output escaping. However, the lack of nonce and capability checks, coupled with the outdated bundled library, introduces significant latent risks that require attention. The plugin's overall security is thus a mixed bag, with a strong foundation but critical missing pieces.

Key Concerns

  • Missing nonce checks on all entry points
  • Missing capability checks on all entry points
  • Bundled outdated library (jQuery v1.3.2)
Vulnerabilities
None known

dtSlider Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

dtSlider Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

jQuery1.3.2
Attack Surface

dtSlider Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionthe_postsdtSlider.php:34
Maintenance & Trust

dtSlider Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedMar 2, 2011
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

dtSlider Developer Profile

danstech

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect dtSlider

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about dtSlider