Ooyala Security & Risk Analysis

wordpress.org/plugins/ooyala-video-browser

Connect your Ooyala account to embed and upload assets directly from WordPress.

10 active installs v3.1.0 PHP + WP 3.9+ Updated Unknown
mediaooyalavideo
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ooyala Safe to Use in 2026?

Generally Safe

Score 100/100

Ooyala has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "ooyala-video-browser" v3.1.0 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices in several areas: it exclusively uses prepared statements for its SQL queries, maintains a high percentage of properly escaped output, and has no recorded vulnerabilities or CVEs, suggesting a history of stable and secure development. The absence of bundled libraries also reduces the risk of relying on outdated, vulnerable components.

However, a significant concern arises from its attack surface. The plugin exposes three AJAX handlers, all of which lack authentication checks. This means that any unauthenticated user could potentially interact with these handlers, opening the door to various attacks if the handler logic is flawed or can be manipulated. While the taint analysis shows no critical or high-severity unsanitized flows, the lack of authorization on these entry points is a substantial risk that could be exploited in conjunction with other plugin weaknesses, even if not immediately apparent in the static analysis alone.

In conclusion, while the plugin has a clean vulnerability history and good coding hygiene in database interactions and output sanitization, the unprotected AJAX endpoints represent a critical weakness. The absence of nonce and capability checks on these entry points is a serious oversight that significantly elevates the risk profile of this plugin. Users should be aware of this exposure, and developers should prioritize securing these AJAX handlers.

Key Concerns

  • AJAX handlers without auth checks
  • AJAX handlers without auth checks
  • AJAX handlers without auth checks
  • Limited nonce checks on entry points
  • Limited capability checks on entry points
  • Minor output escaping issues (7% unescaped)
Vulnerabilities
None known

Ooyala Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Ooyala Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
11
144 escaped
Nonce Checks
1
Capability Checks
1
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

93% escaped155 total outputs
Attack Surface
3 unprotected

Ooyala Attack Surface

Entry Points3
Unprotected3

AJAX Handlers 3

authwp_ajax_ooyala_sign_requestooyala.php:186
authwp_ajax_ooyala_downloadooyala.php:189
authwp_ajax_ooyala_get_image_idooyala.php:192
WordPress Hooks 10
actionadmin_enqueue_scriptsooyala.php:158
actionwp_enqueue_scriptsooyala.php:161
actionmedia_buttonsooyala.php:164
actionadmin_noticesooyala.php:167
actionprint_media_templatesooyala.php:170
actioninitooyala.php:173
filterno_texturize_shortcodesooyala.php:176
actionadmin_initooyala.php:179
actionadmin_menuooyala.php:180
actionparse_requestooyala.php:183
Maintenance & Trust

Ooyala Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedUnknown
PHP min version
Downloads19K

Community Trust

Rating36/100
Number of ratings4
Active installs10
Developer Profile

Ooyala Developer Profile

Automattic

213 plugins · 19.2M total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
1384 days
View full developer profile
Detection Fingerprints

How We Detect Ooyala

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ooyala-video-browser/css/ooyala-video-browser.css/wp-content/plugins/ooyala-video-browser/css/admin.css/wp-content/plugins/ooyala-video-browser/js/ooyala-video-browser.js/wp-content/plugins/ooyala-video-browser/js/ooyala-video-browser-backend.js/wp-content/plugins/ooyala-video-browser/js/ooyala-video-browser-frontend.js/wp-content/plugins/ooyala-video-browser/js/admin-media-manager.js/wp-content/plugins/ooyala-video-browser/js/jquery.fileupload.js/wp-content/plugins/ooyala-video-browser/js/jquery.iframe-transport.js
Script Paths
/wp-content/plugins/ooyala-video-browser/js/ooyala-video-browser.js/wp-content/plugins/ooyala-video-browser/js/ooyala-video-browser-backend.js/wp-content/plugins/ooyala-video-browser/js/ooyala-video-browser-frontend.js/wp-content/plugins/ooyala-video-browser/js/admin-media-manager.js/wp-content/plugins/ooyala-video-browser/js/jquery.fileupload.js/wp-content/plugins/ooyala-video-browser/js/jquery.iframe-transport.js
Version Parameters
/wp-content/plugins/ooyala-video-browser/css/ooyala-video-browser.css?ver=/wp-content/plugins/ooyala-video-browser/css/admin.css?ver=/wp-content/plugins/ooyala-video-browser/js/ooyala-video-browser.js?ver=/wp-content/plugins/ooyala-video-browser/js/ooyala-video-browser-backend.js?ver=/wp-content/plugins/ooyala-video-browser/js/ooyala-video-browser-frontend.js?ver=/wp-content/plugins/ooyala-video-browser/js/admin-media-manager.js?ver=/wp-content/plugins/ooyala-video-browser/js/jquery.fileupload.js?ver=/wp-content/plugins/ooyala-video-browser/js/jquery.iframe-transport.js?ver=

HTML / DOM Fingerprints

CSS Classes
ooyala-video-wrapper
HTML Comments
<!-- Ooyala: The WordPress plugin! --><!-- Ooyala settings screen --><!-- Ooyala Media Manager --><!-- Ooyala Video Browser Widget -->
Data Attributes
data-ooyala-optionsdata-ooyala-pcodedata-ooyala-player-iddata-ooyala-code
JS Globals
OoyalaVideo
REST Endpoints
/wp-json/ooyala/v1/sign/wp-json/ooyala/v1/download/wp-json/ooyala/v1/image
Shortcode Output
[ooyala]
FAQ

Frequently Asked Questions about Ooyala