Fluidvids for WordPress Security & Risk Analysis

wordpress.org/plugins/fluidvids

Standalone JavaScript for fluid YouTube/Vimeo iframe embeds. Easily add additional video players and selectors in the settings.

100 active installs v1.4.1 PHP + WP 3.5+ Updated Sep 4, 2014
fluidvidsiframeresponsivevimeoyoutube
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Fluidvids for WordPress Safe to Use in 2026?

Generally Safe

Score 85/100

Fluidvids for WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The fluidvids plugin v1.4.1 exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of any identified vulnerabilities in its history, combined with the lack of critical or high severity issues in taint analysis, suggests a well-developed and secure plugin. The code analysis reveals no dangerous functions, file operations, or external HTTP requests, further reinforcing this. The plugin also has a small attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that lack proper authentication or permission checks, indicating good practice in limiting potential entry points for attackers. The presence of some SQL queries, even if only 50% use prepared statements, is a minor concern, as is the low percentage of properly escaped output, which could theoretically lead to cross-site scripting (XSS) vulnerabilities if not handled appropriately by the WordPress core or theme. However, the overall lack of critical findings and historical vulnerabilities makes fluidvids v1.4.1 appear to be a relatively safe plugin to use. The primary areas for potential improvement lie in ensuring all SQL queries are prepared and that all output is properly escaped to eliminate any remaining theoretical attack vectors.

Key Concerns

  • SQL queries not using prepared statements
  • Low percentage of properly escaped output
Vulnerabilities
None known

Fluidvids for WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Fluidvids for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
1 prepared
Unescaped Output
3
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

50% prepared2 total queries

Output Escaping

25% escaped4 total outputs
Attack Surface

Fluidvids for WordPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitclass-fluidvids.php:82
actionwp_enqueue_scriptsclass-fluidvids.php:85
actionwp_footerclass-fluidvids.php:86
filteradmin_initclass-fluidvids.php:93
Maintenance & Trust

Fluidvids for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedSep 4, 2014
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

Fluidvids for WordPress Developer Profile

Ulrich

2 plugins · 120 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Fluidvids for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/fluidvids/js/fluidvids.min.js
Script Paths
/wp-content/plugins/fluidvids/js/fluidvids.min.js
Version Parameters
fluidvids/js/fluidvids.min.js?ver=

HTML / DOM Fingerprints

Data Attributes
name="fluidvids[players]"name="fluidvids[selectors]"id="players"id="selectors"
JS Globals
fluidvids.init
FAQ

Frequently Asked Questions about Fluidvids for WordPress