Lazy load video players Security & Risk Analysis

wordpress.org/plugins/mhm-lazyloadvideo

Any video player which is included on the page will only be loaded if/when it is visible within the current browser window.

10 active installs v1.3.5 PHP + WP 4.6.0+ Updated Unknown
lazy-loadperformancevideovideo-player
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Lazy load video players Safe to Use in 2026?

Generally Safe

Score 100/100

Lazy load video players has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The static analysis of mhm-lazyloadvideo v1.3.5 reveals a strong adherence to several core security practices, particularly in its handling of SQL queries and the absence of known vulnerabilities. The plugin demonstrates a good understanding of secure coding by exclusively using prepared statements for its SQL operations, which is a significant strength. Furthermore, the lack of any reported CVEs, either historical or currently unpatched, suggests a stable and well-maintained codebase in terms of known exploits. However, a critical concern arises from the complete lack of output escaping. With 100% of outputs not being properly escaped, this presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is displayed by the plugin without proper sanitization could be exploited by attackers to inject malicious scripts. The absence of capability checks and nonce checks, while not directly flagged as an issue given the limited attack surface, still represents a potential weakness if new entry points were to be introduced in future versions without these security measures. The plugin's current limited attack surface (0 entry points) is a positive factor mitigating some risks, but the unescaped output remains a substantial security flaw.

Key Concerns

  • Output escaping: 0% properly escaped
  • Capability checks: 0
  • Nonce checks: 0
Vulnerabilities
None known

Lazy load video players Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Lazy load video players Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Lazy load video players Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterembed_oembed_htmlPlugin.php:19
filteroembed_resultPlugin.php:20
actionwp_headPlugin.php:21
Maintenance & Trust

Lazy load video players Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedUnknown
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Lazy load video players Developer Profile

Mark Howells-Mead

8 plugins · 2K total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Lazy load video players

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/mhm-lazyloadvideo/Resources/Public/JavaScript/mhmlazyloadvideo.js
Version Parameters
mhm-lazyloadvideo/Resources/Public/JavaScript/mhmlazyloadvideo.js?v=

HTML / DOM Fingerprints

Data Attributes
data-mhmlazyloadvideodata-srcdata-plugin="mhm_lazyloadvideo"
JS Globals
window.mhmlazyloadvideovar mhmlazyloadvideo
FAQ

Frequently Asked Questions about Lazy load video players