Information Reel Security & Risk Analysis

wordpress.org/plugins/information-reel

This plugin scroll the entered title, image, and description in your word press website. This is best way to announce your messages to user.

300 active installs v10.1 PHP + WP 3.4+ Updated Oct 28, 2023
announcementreelscrollscrollertext-scroll
84
B · Generally Safe
CVEs total1
Unpatched0
Last CVEOct 30, 2023
Safety Verdict

Is Information Reel Safe to Use in 2026?

Mostly Safe

Score 84/100

Information Reel is generally safe to use though it hasn't been updated recently. 1 past CVE were resolved. Keep it updated.

1 known CVELast CVE: Oct 30, 2023Updated 2yr ago
Risk Assessment

The information-reel plugin version 10.1 exhibits a mixed security posture. On the positive side, the static analysis reveals a very small attack surface with only one shortcode and no AJAX handlers, REST API routes, or cron events exposed to potential attackers. The plugin also demonstrates good practices regarding SQL queries, with 96% utilizing prepared statements, and includes some nonce checks. The absence of file operations and external HTTP requests further reduces potential risks.

However, a significant concern arises from the very low percentage (18%) of properly escaped output. This indicates a high potential for cross-site scripting (XSS) vulnerabilities, where user-supplied input might be rendered directly in the browser without adequate sanitization. While no critical or high severity taint flows were identified in the static analysis, the lack of output escaping is a fundamental security weakness that could be exploited. The plugin's history of one high-severity SQL injection vulnerability, although currently patched, suggests a past area of weakness that requires continued vigilance.

In conclusion, while the plugin has a limited attack surface and good SQL practices, the prevalent issue with output escaping presents a tangible risk. This, combined with a past SQL injection vulnerability, necessitates careful monitoring and potential code review to ensure that all output is properly sanitized to prevent XSS attacks. The absence of capability checks on any entry points also represents a missed opportunity for robust authorization.

Key Concerns

  • Low output escaping percentage
  • Past high severity SQL injection vulnerability
  • No capability checks on entry points
Vulnerabilities
1

Information Reel Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

CVE-2023-5429high · 8.8Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Information Reel <= 10.0 - Authenticated (Subscriber+) SQL Injection via Shortcode

Oct 30, 2023 Patched in 10.1 (85d)
Code Analysis
Analyzed Mar 16, 2026

Information Reel Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
25 prepared
Unescaped Output
61
13 escaped
Nonce Checks
3
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

96% prepared26 total queries

Output Escaping

18% escaped74 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<content-management-show> (pages\content-management-show.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Information Reel Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[information-reel] information-reel.php:603
WordPress Hooks 5
actionadmin_menuinformation-reel.php:382
actionplugins_loadedinformation-reel.php:604
actioninitinformation-reel.php:605
actionwidgets_initinformation-reel.php:606
actionadmin_enqueue_scriptsinformation-reel.php:610
Maintenance & Trust

Information Reel Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedOct 28, 2023
PHP min version
Downloads41K

Community Trust

Rating86/100
Number of ratings3
Active installs300
Developer Profile

Information Reel Developer Profile

gopiplus

52 plugins · 19K total installs

76
trust score
Avg Security Score
83/100
Avg Patch Time
70 days
View full developer profile
Detection Fingerprints

How We Detect Information Reel

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/information-reel/information-reel.php
Version Parameters
information-reel/style.css?ver=10.1

HTML / DOM Fingerprints

CSS Classes
IR-regimageIR_div
Data Attributes
id="IRHolder"
JS Globals
var IR = new Array()var objIR = ''var IR_scrollPos = ''var IR_numScrolls = ''var IR_heightOfElm = 'var IR_numberOfElm = '+4 more
Shortcode Output
[information-reel group[information-reel group="WIDGET" length[information-reel group="WIDGET" length="125" display[information-reel group="WIDGET" length="125" display="3" height
FAQ

Frequently Asked Questions about Information Reel