Loading Bar Security & Risk Analysis

wordpress.org/plugins/loading-bar

Add loading bar to your website easily, like youtube loading bar! just one click and custom loading bar color and responsive.

200 active installs v1.0.0 PHP + WP 2.8.0+ Updated Aug 20, 2016
loaderloadingloading-barpreloadyoutube
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Loading Bar Safe to Use in 2026?

Generally Safe

Score 85/100

Loading Bar has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "loading-bar" plugin v1.0.0 demonstrates a strong initial security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points suggests a limited attack surface. Furthermore, the code shows good practices by not utilizing dangerous functions, performing file operations, or making external HTTP requests. The use of prepared statements for all SQL queries is a significant positive indicator. However, the analysis also reveals areas for concern. The fact that only 67% of output is properly escaped indicates a potential for Cross-Site Scripting (XSS) vulnerabilities if the unescaped outputs handle user-supplied data. Additionally, the complete lack of nonce checks and capability checks, combined with zero taint analysis flows, could mean that potential vulnerabilities are not being detected or are present but masked by the limited functionality examined.

The plugin's vulnerability history is clean, with no known CVEs recorded. This is generally a positive sign, suggesting that the plugin has either been historically secure or has not been a significant target. However, the absence of past vulnerabilities does not guarantee future security. It's crucial to consider that a limited attack surface and lack of complex functionality might also contribute to this clean record. The plugin's strengths lie in its minimal attack surface and secure SQL handling. The primary weakness identified is the incomplete output escaping, which could lead to XSS if not addressed. The absence of security checks like nonces and capability checks, while not directly indicative of a current vulnerability, represents a missed opportunity to bolster defenses.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Loading Bar Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Loading Bar Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped3 total outputs
Attack Surface

Loading Bar Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterplugin_row_metaloading-bar.php:52
actionwp_enqueue_scriptsloading-bar.php:58
actionwp_footerloading-bar.php:87
actionadmin_initsetting.php:15
Maintenance & Trust

Loading Bar Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedAug 20, 2016
PHP min version
Downloads10K

Community Trust

Rating98/100
Number of ratings8
Active installs200
Developer Profile

Loading Bar Developer Profile

Alobaidi

22 plugins · 33K total installs

81
trust score
Avg Security Score
90/100
Avg Patch Time
52 days
View full developer profile
Detection Fingerprints

How We Detect Loading Bar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/loading-bar/js/nanobar.js
Script Paths
/wp-content/plugins/loading-bar/js/nanobar.js

HTML / DOM Fingerprints

JS Globals
Nanobarnanobaroptions
FAQ

Frequently Asked Questions about Loading Bar