HTML5 Youtube Player Security & Risk Analysis

wordpress.org/plugins/html5-youtube-player

Simply Embed Youtube video with custom HTML5 Player as Video and Audio

10 active installs v1.0.1 PHP + WP 3.0.1+ Updated Jul 28, 2017
audiocustomhtml5playeryoutube
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is HTML5 Youtube Player Safe to Use in 2026?

Generally Safe

Score 85/100

HTML5 Youtube Player has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "html5-youtube-player" plugin v1.0.1 exhibits a generally good security posture with several strengths, including the absence of known CVEs and the use of prepared statements for its sole SQL query. The plugin also demonstrates a minimal attack surface with only one shortcode and no unprotected entry points. However, there are significant areas of concern. The lack of any nonce or capability checks on the shortcode, which is the plugin's only entry point, presents a substantial risk. Furthermore, the analysis shows that 40% of output is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is rendered without sanitization.

The taint analysis revealed two flows with unsanitized paths, and while these are not classified as critical or high severity, they warrant attention. The presence of file operations and an external HTTP request, without clear indications of sanitization or authentication checks around their usage, adds to the potential risk profile. The plugin's vulnerability history is clean, which is positive, but the current code analysis indicates potential weaknesses that could be exploited in the future if not addressed. The absence of nonces and capability checks, combined with the unsanitized path flows and insufficient output escaping, creates a moderate to high risk environment for this plugin.

Key Concerns

  • Shortcode without capability checks
  • Shortcode without nonce checks
  • Unescaped output (60% of outputs)
  • Taint flows with unsanitized paths (2 flows)
  • File operations present
  • External HTTP requests present
Vulnerabilities
None known

HTML5 Youtube Player Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

HTML5 Youtube Player Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
3
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

40% escaped5 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
redirect (inc\mp3.php:107)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

HTML5 Youtube Player Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[varvideo] plugin.php:83
Maintenance & Trust

HTML5 Youtube Player Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedJul 28, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

HTML5 Youtube Player Developer Profile

jabedbd

4 plugins · 60 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect HTML5 Youtube Player

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/html5-youtube-player/inc/css/youtube.css/wp-content/plugins/html5-youtube-player/inc/js/youtube.js
Script Paths
/wp-content/plugins/html5-youtube-player/inc/js/youtube.js
Version Parameters
html5-youtube-player/inc/css/youtube.css?ver=html5-youtube-player/inc/js/youtube.js?ver=

HTML / DOM Fingerprints

CSS Classes
youtube-player
Data Attributes
data-iddata-quality
JS Globals
YT
Shortcode Output
<video<audio
FAQ

Frequently Asked Questions about HTML5 Youtube Player