OEmbed in Library Security & Risk Analysis

wordpress.org/plugins/oembed-in-library

Easily add external files in library using OEmbed API

70 active installs v1.0.2 PHP + WP 3.5+ Updated Nov 5, 2013
librarymediaoembedvideoyoutube
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is OEmbed in Library Safe to Use in 2026?

Generally Safe

Score 85/100

OEmbed in Library has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "oembed-in-library" plugin exhibits a concerning security posture primarily due to its lack of proper authentication and output sanitization. While it demonstrates good practices in handling SQL queries and has no recorded vulnerability history, these strengths are overshadowed by significant weaknesses in its attack surface and code sanitization. The presence of an unprotected AJAX handler presents a direct entry point for malicious actors, and the complete absence of output escaping on all analyzed outputs is a critical flaw. This suggests that any data processed or displayed by the plugin could be vulnerable to cross-site scripting (XSS) attacks. The taint analysis, although showing no critical or high severity flows, does indicate unsanitized paths, which, combined with the unescaped output, points to a high probability of XSS vulnerabilities. The plugin's vulnerability history being clean might indicate it hasn't been a target or has flown under the radar, but the current code analysis reveals exploitable weaknesses that should not be ignored.

Key Concerns

  • Unprotected AJAX handler
  • No output escaping on any outputs
  • Unsanitized paths in taint analysis
Vulnerabilities
None known

OEmbed in Library Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

OEmbed in Library Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
ajax_preview (index.php:128)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

OEmbed in Library Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_oembed_in_library_previewindex.php:67
WordPress Hooks 8
actionplugins_loadedindex.php:63
actionadmin_enqueue_scriptsindex.php:66
actionadmin_initindex.php:69
actionadmin_menuindex.php:70
actionedit_form_after_titleindex.php:71
actionadmin_noticesindex.php:87
actionadmin_action_oembed_add_in_libraryindex.php:155
filtericon_dirsindex.php:156
Maintenance & Trust

OEmbed in Library Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedNov 5, 2013
PHP min version
Downloads4K

Community Trust

Rating60/100
Number of ratings2
Active installs70
Developer Profile

OEmbed in Library Developer Profile

Cyril Batillat

4 plugins · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect OEmbed in Library

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/oembed-in-library/js/oembed_in_library.js/wp-content/plugins/oembed-in-library/css/oembed_in_library.css
Script Paths
/wp-content/plugins/oembed-in-library/js/oembed_in_library.js
Version Parameters
oembed_js?ver=1.0oembed_css?ver=1.0

HTML / DOM Fingerprints

CSS Classes
hide-if-no-js
Data Attributes
id="oembed_url"id="oembed_in_library_btn_preview"id="oembed_in_library_preview"name="action"value="oembed_add_in_library"name="oembed_url"
JS Globals
ajax_object
FAQ

Frequently Asked Questions about OEmbed in Library