oEmbed Plus Security & Risk Analysis

wordpress.org/plugins/oembed-plus

Adds support for embedding Facebook and Instagram posts in Block Editor (Gutenberg) and Classic Editor.

4K active installs v1.6 PHP 7.1+ WP 4.9+ Updated Jul 15, 2021
embedfacebookinstagramoembed
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is oEmbed Plus Safe to Use in 2026?

Generally Safe

Score 85/100

oEmbed Plus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the oembed-plus plugin version 1.6 exhibits an excellent security posture. The code analysis reveals a remarkably clean codebase with no identified dangerous functions, no direct SQL queries (all are prepared), and all identified output is properly escaped. Furthermore, there are no file operations or external HTTP requests, and crucially, no identifiable attack surface through AJAX handlers, REST API routes, shortcodes, or cron events that lack authentication or capability checks. The taint analysis also shows zero flows with unsanitized paths, indicating a strong defense against common injection vulnerabilities.

The plugin's vulnerability history further reinforces its security. With zero recorded CVEs of any severity, and no common vulnerability types or recent past issues, it suggests a consistently secure development and maintenance process. This lack of historical vulnerabilities, combined with the current clean static analysis, points to a plugin that has likely been built with security as a priority and has undergone thorough vetting.

In conclusion, oembed-plus v1.6 appears to be a highly secure plugin. Its strengths lie in its minimal attack surface, robust code practices like prepared statements and proper output escaping, and a spotless vulnerability history. There are no apparent weaknesses or risks identified in the provided data, making it a strong choice from a security perspective.

Vulnerabilities
None known

oEmbed Plus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

oEmbed Plus Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

oEmbed Plus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filteroembed_providersoembed-plus.php:16
filteroembed_fetch_urloembed-plus.php:21
actionadmin_initoembed-plus.php:41
Maintenance & Trust

oEmbed Plus Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedJul 15, 2021
PHP min version7.1
Downloads108K

Community Trust

Rating100/100
Number of ratings7
Active installs4K
Developer Profile

oEmbed Plus Developer Profile

Ayesh Karunaratne

7 plugins · 8K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect oEmbed Plus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/oembed-plus/src/js/admin.js/wp-content/plugins/oembed-plus/src/css/admin.css
Script Paths
/wp-content/plugins/oembed-plus/src/js/admin.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about oEmbed Plus