Embed Iframe Security & Risk Analysis

wordpress.org/plugins/embed-iframe

Allows the insertion of code to display an external webpage within an iframe.

2K active installs v1.2 PHP 5.3+ WP 1.3+ Updated Jun 1, 2022
embediframepagepost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Embed Iframe Safe to Use in 2026?

Generally Safe

Score 85/100

Embed Iframe has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "embed-iframe" v1.2 plugin exhibits a generally strong security posture based on the provided static analysis. It has no known vulnerabilities (CVEs) and no recorded critical or high-severity issues in its history. The code analysis reveals a complete absence of dangerous functions, file operations, and external HTTP requests, which are common vectors for exploitation. Furthermore, all SQL queries utilize prepared statements, and there are no identified taint flows, indicating a good effort to prevent common injection attacks.

However, there are notable areas for improvement. The plugin has zero capability checks and zero nonce checks across all of its entry points (AJAX handlers, REST API routes, shortcodes, cron events). This means that any of these entry points, if they were to exist, would be entirely unprotected against unauthorized access or manipulation. Additionally, while a majority of output escaping is proper (67%), there is still a portion that is not, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is involved in the unescaped outputs. The lack of any identified attack surface is unusual, and if this is genuinely the case, it implies the plugin has no direct user-facing interaction points, which is a positive, but the absence of security checks on *potential* entry points is a significant concern.

In conclusion, the plugin's clean vulnerability history and good practices in SQL and external requests are commendable. However, the complete absence of capability and nonce checks on all its entry points presents a significant security gap. The unescaped output is a medium concern. The overall security is good, but the lack of fundamental access control checks is a weakness that could be exploited if new entry points are introduced or if the analysis missed something.

Key Concerns

  • No capability checks on entry points
  • No nonce checks on entry points
  • Unescaped output present
Vulnerabilities
None known

Embed Iframe Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Embed Iframe Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
10 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped15 total outputs
Attack Surface

Embed Iframe Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterthe_contentembediframe.php:23
actionwp_headembediframe.php:24
actioninitplugin.php:123
Maintenance & Trust

Embed Iframe Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedJun 1, 2022
PHP min version5.3
Downloads156K

Community Trust

Rating68/100
Number of ratings5
Active installs2K
Developer Profile

Embed Iframe Developer Profile

brajesh

15 plugins · 4K total installs

69
trust score
Avg Security Score
86/100
Avg Patch Time
3856 days
View full developer profile
Detection Fingerprints

How We Detect Embed Iframe

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<iframe src="" width="" height="" frameborder="0" scrolling="auto" seamless="seamless" allowfullscreen="allowfullscreen"></iframe>
FAQ

Frequently Asked Questions about Embed Iframe