Mediacore Ingest (FeedWordPress AddOn) Security & Risk Analysis

wordpress.org/plugins/mediacore-ingest-fwp-addon

This plugin works in concert with the FeedWordPress plugin to enhance syndication of content from Mediacore sites.

10 active installs v1.0 PHP + WP 3.0.1+ Updated Apr 4, 2014
embedfeedwordpressmediacorerssvideo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Mediacore Ingest (FeedWordPress AddOn) Safe to Use in 2026?

Generally Safe

Score 85/100

Mediacore Ingest (FeedWordPress AddOn) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

This plugin, mediacore-ingest-fwp-addon v1.0, exhibits a generally positive security posture based on the provided static analysis. The absence of direct SQL queries, external HTTP requests, file operations, and the presence of capability checks are strong indicators of good development practices for a plugin of this nature. The small attack surface with no apparent unprotected entry points is also a significant strength, suggesting that most interactions with the plugin are intended to be authorized.

However, the static analysis highlights a critical concern: 100% of outputs are not properly escaped. This represents a significant risk, as it opens the door to Cross-Site Scripting (XSS) vulnerabilities if any user-supplied data is reflected in the plugin's output. While there are no reported CVEs and the taint analysis shows no immediate critical or high severity flows, the unescaped output is a fundamental security flaw that should be addressed urgently. The lack of vulnerability history also suggests either a very new plugin or one that has not yet been subject to significant security scrutiny, making the existing code signals even more important to review.

In conclusion, mediacore-ingest-fwp-addon v1.0 benefits from a limited attack surface and some robust security implementations. Nevertheless, the widespread lack of output escaping is a serious weakness that elevates the risk profile considerably. Addressing this issue should be the top priority to improve the plugin's overall security.

Key Concerns

  • All outputs are unescaped
Vulnerabilities
None known

Mediacore Ingest (FeedWordPress AddOn) Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Mediacore Ingest (FeedWordPress AddOn) Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Mediacore Ingest (FeedWordPress AddOn) Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[mediacore] mediacore-ingest.php:124
WordPress Hooks 4
filtersyndicated_itemmediacore-ingest.php:24
filtersyndicated_item_categoriesmediacore-ingest.php:25
actionadmin_initsettings.php:12
actionadmin_menusettings.php:13
Maintenance & Trust

Mediacore Ingest (FeedWordPress AddOn) Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedApr 4, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Mediacore Ingest (FeedWordPress AddOn) Developer Profile

mburtis

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mediacore Ingest (FeedWordPress AddOn)

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[mediacore public_url="" thumb_url="" title="" width="640px" height="360px"]
FAQ

Frequently Asked Questions about Mediacore Ingest (FeedWordPress AddOn)