Load Web Components Security & Risk Analysis

wordpress.org/plugins/load-web-components

WordPress plugin for loading web components and other JavaScript libraries via shortcodes within the content of a post or page.

0 active installs v0.1.1 PHP 5.3+ WP 4.4+ Updated Oct 23, 2017
custom-elementsextented-htmljavascript-libraryweb-componentwebcomponent
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Load Web Components Safe to Use in 2026?

Generally Safe

Score 85/100

Load Web Components has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'load-web-components' plugin v0.1.1 exhibits a generally positive security posture based on the provided static analysis. The complete absence of dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), file operations, and external HTTP requests are strong indicators of secure coding practices. The plugin also has a clean vulnerability history, with no recorded CVEs, which further bolsters confidence in its security. However, a notable area for concern is the output escaping, where only 59% of outputs are properly escaped. This leaves a potential for cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled carefully before being rendered in the browser.

While the plugin's attack surface is minimal and appears to be protected by capability checks for its single shortcode, the lack of nonce checks on AJAX handlers (though there are none in this version) and the limited output escaping are areas that warrant attention for future development. The absence of taint analysis flows is also a positive sign for this specific version, but it's important to note that taint analysis is a valuable tool for uncovering complex vulnerabilities that might be missed by other methods. Overall, the plugin is relatively secure for its current version, but the identified output escaping deficiency presents a tangible risk that should be addressed.

Key Concerns

  • Output escaping issues
Vulnerabilities
None known

Load Web Components Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Load Web Components Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
10 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

59% escaped17 total outputs
Attack Surface

Load Web Components Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[load-webcomponent] load-webcomponents.php:56
WordPress Hooks 4
actioninitload-webcomponents.php:32
actionwp_headload-webcomponents.php:96
actionadmin_initload-webcomponents_admin.php:61
actionadmin_menuload-webcomponents_admin.php:289
Maintenance & Trust

Load Web Components Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedOct 23, 2017
PHP min version5.3
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Load Web Components Developer Profile

Friese

2 plugins · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Load Web Components

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/load-web-components/load-web-components.php

HTML / DOM Fingerprints

Data Attributes
namesrc
Shortcode Output
[load-webcomponent name='...'][load-webcomponent src='...']
FAQ

Frequently Asked Questions about Load Web Components