MI Carousel Security & Risk Analysis

wordpress.org/plugins/mi-carousel-slider

This is a MI Carousel Slider Lightweight slider and easily integrate on your theme

0 active installs v2.0.3 PHP 7.2+ WP 5.2.4+ Updated Unknown
carouselmi-slidersimple-fadesimple-sliderslider
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is MI Carousel Safe to Use in 2026?

Generally Safe

Score 100/100

MI Carousel has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "mi-carousel-slider" plugin v2.0.3 exhibits a generally good security posture based on the provided static analysis. It demonstrates no known vulnerabilities in its history and avoids dangerous functions, raw SQL queries, and external HTTP requests. The presence of nonce and capability checks on its two identified entry points is also a positive indicator of security consciousness. However, a notable concern lies in the output escaping. With 31% of its 29 output operations being properly escaped, there's a significant risk of Cross-Site Scripting (XSS) vulnerabilities. This means that user-supplied data, if not handled carefully, could be rendered directly in the browser, allowing for malicious script execution.

While the plugin has a clean vulnerability history, which is excellent, the current static analysis reveals a weakness in output sanitization. The absence of any identified taint flows is encouraging, but the unescaped output signals a potential for vulnerabilities that might not be easily detected by static analysis alone. Therefore, while the plugin has strengths in its adherence to secure coding practices for database interaction and entry point protection, the inadequate output escaping presents a clear and present risk that needs to be addressed.

Key Concerns

  • Insufficient output escaping
Vulnerabilities
None known

MI Carousel Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

MI Carousel Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
20
9 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

31% escaped29 total outputs
Attack Surface

MI Carousel Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[mi-carousel] shortcode\mi_carousel.php:4
WordPress Hooks 19
actioninitinc\kc_mi_carousel.php:2
actionwp_enqueue_scriptsmi-carousel.php:48
actioninitmi-carousel.php:50
actioninitmi-carousel.php:51
actioninitmi-carousel.php:52
filtermanage_mi_carousel_slider_posts_columnsviews\label.php:2
actionmanage_mi_carousel_slider_posts_custom_columnviews\label.php:3
filterenter_title_hereviews\label.php:53
actionadd_meta_boxesviews\metabox.php:8
actionsave_postviews\metabox.php:126
actionadd_meta_boxesviews\metabox.php:164
actionsave_postviews\metabox.php:212
actionmi_carousels_add_form_fieldsviews\taxonomy.php:97
actionmi_carousels_edit_form_fieldsviews\taxonomy.php:207
actionedited_mi_carouselsviews\taxonomy.php:224
actioncreate_mi_carouselsviews\taxonomy.php:225
filtermanage_edit-mi_carousels_columnsviews\taxonomy.php:227
actionmi_carousels_edit_formviews\taxonomy.php:238
actionmi_carousels_add_formviews\taxonomy.php:239
Maintenance & Trust

MI Carousel Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedUnknown
PHP min version7.2
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

MI Carousel Developer Profile

midexigner

2 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MI Carousel

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about MI Carousel