MaxtDesign PDF Viewer Security & Risk Analysis

wordpress.org/plugins/maxtdesign-pdf-viewer

The fastest PDF viewer for WordPress. Sub-200ms load times, zero layout shift, and a beautiful reading experience.

0 active installs v1.0.0 PHP 8.1+ WP 6.4+ Updated Dec 29, 2025
documentembedgutenbergpdfviewer
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is MaxtDesign PDF Viewer Safe to Use in 2026?

Generally Safe

Score 100/100

MaxtDesign PDF Viewer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The maxtdesign-pdf-viewer plugin version 1.0.0 exhibits a generally strong security posture based on the provided static analysis. All identified entry points, including AJAX handlers, shortcodes, and cron events, appear to have appropriate authentication and capability checks in place. The plugin also demonstrates good practices regarding SQL query sanitization, with a respectable 55% of queries using prepared statements, and a high rate of output escaping (92%), minimizing the risk of cross-site scripting vulnerabilities. The absence of known CVEs and a clean vulnerability history further bolster its security reputation.

However, there are a few areas that warrant careful consideration. While no critical taint flows were detected, the plugin performs four file operations, which can sometimes introduce vulnerabilities if not handled with extreme care, especially concerning path traversal or unauthorized file access. The reliance on internal WordPress functionalities and the absence of external HTTP requests are positive signs, reducing the attack surface from external sources. The presence of nonce checks on some handlers is good, but the total number of entry points is five, suggesting a need for consistent and robust security measures across all.

In conclusion, maxtdesign-pdf-viewer v1.0.0 appears to be a relatively secure plugin with a good foundation of security practices. The lack of historical vulnerabilities and the majority of code signals pointing towards secure coding are encouraging. The primary areas for potential improvement would involve ensuring all file operations are rigorously validated and that the security checks on all entry points remain consistently applied and audited. The current analysis does not highlight any critical or high-risk issues, suggesting that the risk to a WordPress site utilizing this plugin is likely low, provided it remains updated and is not susceptible to future, as-yet-undiscovered vulnerabilities.

Key Concerns

  • SQL queries not using prepared statements
  • File operations present
  • Potential for unvalidated file operations
Vulnerabilities
None known

MaxtDesign PDF Viewer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

MaxtDesign PDF Viewer Code Analysis

Dangerous Functions
0
Raw SQL Queries
5
6 prepared
Unescaped Output
7
81 escaped
Nonce Checks
4
Capability Checks
8
File Operations
4
External Requests
0
Bundled Libraries
0

SQL Query Safety

55% prepared11 total queries

Output Escaping

92% escaped88 total outputs
Attack Surface

MaxtDesign PDF Viewer Attack Surface

Entry Points5
Unprotected0

AJAX Handlers 4

authwp_ajax_mdpv_bulk_processadmin\class-mdpv-admin.php:68
authwp_ajax_mdpv_clear_cacheadmin\class-mdpv-admin.php:69
authwp_ajax_mdpv_get_statsadmin\class-mdpv-admin.php:70
authwp_ajax_mdpv_refresh_capabilitiesadmin\class-mdpv-admin.php:71

Shortcodes 1

[pdf_viewer] includes\class-mdpv-plugin.php:290
WordPress Hooks 15
actionadmin_menuadmin\class-mdpv-admin.php:63
actionadmin_initadmin\class-mdpv-admin.php:64
actionadmin_enqueue_scriptsadmin\class-mdpv-admin.php:65
actionenqueue_block_editor_assetsincludes\class-mdpv-block.php:42
actioninitincludes\class-mdpv-plugin.php:283
actionwp_enqueue_scriptsincludes\class-mdpv-plugin.php:284
actioninitincludes\class-mdpv-plugin.php:287
filterthe_contentincludes\class-mdpv-plugin.php:293
actionadd_attachmentincludes\class-mdpv-plugin.php:296
filterwp_generate_attachment_metadataincludes\class-mdpv-plugin.php:299
actiondelete_attachmentincludes\class-mdpv-plugin.php:302
actionmdpv_cleanup_cacheincludes\class-mdpv-plugin.php:308
actionrest_api_initincludes\class-mdpv-plugin.php:311
filterscript_loader_tagincludes\class-mdpv-plugin.php:363
actionadmin_noticesmaxtdesign-pdf-viewer.php:50

Scheduled Events 1

mdpv_cleanup_cache
Maintenance & Trust

MaxtDesign PDF Viewer Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 29, 2025
PHP min version8.1
Downloads112

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

MaxtDesign PDF Viewer Developer Profile

MaxtDesign

3 plugins · 70 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MaxtDesign PDF Viewer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/maxtdesign-pdf-viewer/assets/css/mdpv-admin.css/wp-content/plugins/maxtdesign-pdf-viewer/assets/js/mdpv-admin.js/wp-content/plugins/maxtdesign-pdf-viewer/assets/js/mdpv-frontend.js
Script Paths
/wp-content/plugins/maxtdesign-pdf-viewer/assets/js/mdpv-admin.js/wp-content/plugins/maxtdesign-pdf-viewer/assets/js/mdpv-frontend.js
Version Parameters
maxtdesign-pdf-viewer/assets/css/mdpv-admin.css?ver=maxtdesign-pdf-viewer/assets/js/mdpv-admin.js?ver=maxtdesign-pdf-viewer/assets/js/mdpv-frontend.js?ver=

HTML / DOM Fingerprints

CSS Classes
mdpv-settings-page
HTML Comments
<!-- Security check - exit if accessed directly --><!-- Admin Settings Page --><!-- Plugin instance --><!-- Settings instance -->+24 more
Data Attributes
data-noncedata-action
JS Globals
mdpv_admin_params
REST Endpoints
/wp-json/maxtdesign-pdf-viewer/v1/settings
FAQ

Frequently Asked Questions about MaxtDesign PDF Viewer