Library Viewer Security & Risk Analysis

wordpress.org/plugins/library-viewer

A File & Folder Viewer for FTP folders, enabling the display of library contents (folders & files) on the front-end.

400 active installs v3.2.0 PHP 7.0+ WP 3.0.0+ Updated Jan 10, 2026
download-managerfile-listfile-managerftp
96
A · Safe
CVEs total3
Unpatched0
Last CVEFeb 6, 2026
Safety Verdict

Is Library Viewer Safe to Use in 2026?

Generally Safe

Score 96/100

Library Viewer has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

3 known CVEsLast CVE: Feb 6, 2026Updated 4mo ago
Risk Assessment

The library-viewer plugin, version 3.2.0, presents a mixed security posture. On the positive side, it demonstrates good practices by avoiding dangerous functions, utilizing prepared statements for all SQL queries, and having no external HTTP requests. The total attack surface is small, with only one shortcode identified and no unprotected entry points. However, several concerning signals emerge from the static analysis. A significant portion of output is not properly escaped (only 36%), which, combined with a flow identified with an unsanitized path, raises concerns about potential cross-site scripting (XSS) vulnerabilities. The absence of nonce checks, while not directly linked to any identified AJAX handlers in this analysis, is a general security weakness that can facilitate certain attacks if other vulnerabilities are present or introduced later.

The vulnerability history of this plugin is a notable concern. With three known medium-severity CVEs, even though none are currently unpatched, it indicates a pattern of past security flaws. The common types of past vulnerabilities (XSS and Open Redirect) align with the potential risks identified in the code analysis, particularly the output escaping issues. The fact that the last vulnerability was in early 2026, while seemingly far in the future, might be a data anomaly or indicate the vulnerability was disclosed then. Regardless, the historical prevalence of these vulnerability types suggests a need for ongoing vigilance and robust sanitization practices within the plugin's development lifecycle. In conclusion, while the plugin has some strong security foundations, the poor output escaping and historical vulnerability patterns warrant careful consideration.

Key Concerns

  • Significant percentage of output not properly escaped
  • Flow with unsanitized path found
  • Three medium severity CVEs in history
  • No nonce checks implemented
Vulnerabilities
3 published

Library Viewer Security Vulnerabilities

CVEs by Year

2 CVEs in 2023
2023
1 CVE in 2026
2026
Patched Has unpatched

Severity Breakdown

Medium
3

3 total CVEs

CVE-2025-15396medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Library Viewer < 3.2.0 - Reflected Cross-Site Scripting

Feb 6, 2026 Patched in 3.2.0 (4d)
CVE-2023-32102medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Library Viewer <= 2.0.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

May 3, 2023 Patched in 2.0.6.1 (265d)
CVE-2023-32101medium · 5.4URL Redirection to Untrusted Site ('Open Redirect')

Library Viewer <= 2.0.6 - Open Redirect via 'redirect_to'

May 3, 2023 Patched in 2.0.6.1 (265d)
Version History

Library Viewer Release Timeline

Code Analysis
Analyzed Mar 16, 2026

Library Viewer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
16
9 escaped
Nonce Checks
0
Capability Checks
1
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

36% escaped25 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
print_error_messages (frontend\class-library-viewer-shortcode.php:2050)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Library Viewer Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[library-viewer] library-viewer.php:173
WordPress Hooks 13
actionadmin_noticesadmin\class-library-viewer-admin.php:31
actionadmin_noticesadmin\class-library-viewer-admin.php:32
filterplugin_row_metaadmin\class-library-viewer-plugin-page.php:18
actionwp_loadedfrontend\class-library-viewer-file.php:104
filterdocument_title_partsfrontend\class-library-viewer-shortcode.php:185
actionwp_enqueue_scriptsfrontend\class-library-viewer-shortcode.php:186
actioninitlibrary-viewer.php:157
actionwp_loadedlibrary-viewer.php:159
actioninitlibrary-viewer.php:167
actioninitlibrary-viewer.php:168
actioninitlibrary-viewer.php:170
filterlv_shortcode_class_nameslibrary-viewer.php:178
filterlv_file_viewer_class_nameslibrary-viewer.php:179
Maintenance & Trust

Library Viewer Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 10, 2026
PHP min version7.0
Downloads13K

Community Trust

Rating100/100
Number of ratings13
Active installs400
Developer Profile

Library Viewer Developer Profile

Pexle Chris

2 plugins · 20K total installs

78
trust score
Avg Security Score
98/100
Avg Patch Time
265 days
View full developer profile
Detection Fingerprints

How We Detect Library Viewer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/library-viewer/frontend/css/library-viewer-frontend.css/wp-content/plugins/library-viewer/frontend/css/library-viewer-responsive.css/wp-content/plugins/library-viewer/frontend/js/library-viewer-frontend.js/wp-content/plugins/library-viewer/frontend/js/library-viewer-frontend-modal.js
Script Paths
/wp-content/plugins/library-viewer/frontend/js/library-viewer-frontend.js/wp-content/plugins/library-viewer/frontend/js/library-viewer-frontend-modal.js
Version Parameters
library-viewer/frontend/css/library-viewer-frontend.css?ver=library-viewer/frontend/css/library-viewer-responsive.css?ver=library-viewer/frontend/js/library-viewer-frontend.js?ver=library-viewer/frontend/js/library-viewer-frontend-modal.js?ver=

HTML / DOM Fingerprints

CSS Classes
library-viewer-containerlibrary-viewer-file-browserlibrary-viewer-file-manager-wrapper
HTML Comments
<!-- Library Viewer shortcode output --><!-- Library Viewer Pro & Addons -->
Data Attributes
data-lv-file-viewdata-lv-display-mode
JS Globals
LibraryViewerFrontendlibraryViewerFrontendModal
Shortcode Output
<div class="library-viewer-container"<div class="library-viewer-file-browser"<div class="library-viewer-file-manager-wrapper"
FAQ

Frequently Asked Questions about Library Viewer