
Embed Wikimedia Security & Risk Analysis
wordpress.org/plugins/embed-wikimediaThe Embed Wikimedia plugin adds support for embedding photos from Wikimedia projects such as Wikipedia.
Is Embed Wikimedia Safe to Use in 2026?
Generally Safe
Score 85/100Embed Wikimedia has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "embed-wikimedia" plugin version 0.3.1 presents a mixed security posture. On the positive side, the plugin has no recorded CVEs, no outdated bundled libraries, and does not appear to perform file operations or direct SQL queries without prepared statements, indicating a generally cautious approach to core security practices. The static analysis shows a very small attack surface with no identified entry points or dangerous functions, which is a strong indicator of good security design at this level.
However, a significant concern arises from the complete lack of output escaping. With one output identified and 0% properly escaped, this leaves the plugin vulnerable to Cross-Site Scripting (XSS) attacks. Any data displayed to users, if not properly sanitized before output, could be manipulated by an attacker to inject malicious scripts. Furthermore, the absence of nonce checks and capability checks on any potential (though currently undetected) entry points, combined with a total absence of taint analysis results, means that potential vulnerabilities in data handling might have been overlooked or are not being thoroughly tested for.
While the plugin's history is clean regarding known vulnerabilities, this does not negate the identified risk of unescaped output. The lack of taint analysis and thorough capability checks suggests a potential for undiscovered vulnerabilities, especially if the plugin interacts with user-supplied data in ways not fully captured by the static analysis. In conclusion, the plugin exhibits strengths in its limited attack surface and careful use of prepared statements, but the critical flaw of unescaped output represents a significant and immediate security risk that needs to be addressed.
Key Concerns
- Unescaped output found
- No nonce checks
- No capability checks
- No taint analysis results
Embed Wikimedia Security Vulnerabilities
Embed Wikimedia Code Analysis
Output Escaping
Embed Wikimedia Attack Surface
WordPress Hooks 3
Maintenance & Trust
Embed Wikimedia Maintenance & Trust
Maintenance Signals
Community Trust
Embed Wikimedia Alternatives
Embed Google Photos album
embed-google-photos-album-easily
Embed Google Photos album using Player widget.
Intagrate Lite
instagrate-to-wordpress
Automatically post your Instagram images to your WordPress site. Create new WordPress posts from your Instagram images, save the Instagram image to th …
Google Photos embed
google-photos-embed
Using shared short URL of Google Photos, you can embed the image easy to blog.
PhotoShelter for Photographers Blog Feed Plugin
photoshelter-official-plugin
Embed your PhotoShelter content (single images, gallery cover images, or slideshows) directly into your blog - without leaving WordPress!
Embed Piwigo
embed-piwigo
The Embed Pwigo plugin adds support for embedding photos from whitelisted Piwigo websites.
Embed Wikimedia Developer Profile
3 plugins · 180 total installs
How We Detect Embed Wikimedia
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/embed-wikimedia/resources/blocks.js/wp-content/plugins/embed-wikimedia/resources/blocks.jsembed-wikimedia/resources/blocks.js?ver=1HTML / DOM Fingerprints
/wp-json/embed-wikimedia/v1/commons/(?P<title>.*+)/wp-json/embed-wikimedia/v1/wikipedia/(?P<title>.*+)/wp-json/embed-wikimedia/v1/wikidata/(?P<title>.*+)