Page Loading Security & Risk Analysis

wordpress.org/plugins/page-loading

Add a CSS3 effect to your blog while loading pages. 給你的部落格增加一個帶有CSS3效果的頁面載入動畫

10 active installs v1.0.5 PHP + WP 3.0+ Updated Mar 5, 2014
css3loadingpage
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Page Loading Safe to Use in 2026?

Generally Safe

Score 85/100

Page Loading has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "page-loading" v1.0.5 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface. Furthermore, the analysis indicates no dangerous functions, no raw SQL queries (all use prepared statements), no file operations, and no external HTTP requests, all of which are positive indicators. The plugin also has no recorded vulnerabilities, suggesting a clean security history.

However, there are notable areas of concern. The most significant is the complete lack of output escaping. With one output detected and none properly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities if any user-supplied data is ever rendered directly to the browser. Additionally, the absence of nonce checks and capability checks, while perhaps less critical given the limited attack surface, still represent a deviation from best practices for securing WordPress functionality, especially if the plugin's functionality were to expand in the future. The lack of taint analysis data is also a limitation, making it impossible to assess risks related to data flow vulnerabilities.

In conclusion, while the "page-loading" plugin starts with a very small attack surface and avoids common pitfalls like raw SQL and dangerous functions, the unescaped output presents a significant and actionable risk. The absence of security checks like nonces and capabilities, while less critical now, should be addressed proactively. The plugin's strength lies in its minimal entry points, but its weakness is the lack of output sanitation, which could lead to critical vulnerabilities.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Page Loading Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Page Loading Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Page Loading Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filtertemplate_includepage-loading.php:43
filtershutdownpage-loading.php:53
actionwp_footerpage-loading.php:65
Maintenance & Trust

Page Loading Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedMar 5, 2014
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Developer Profile

Page Loading Developer Profile

Arefly

24 plugins · 2K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Page Loading

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/page-loading/style.css

HTML / DOM Fingerprints

CSS Classes
circlecircle1
FAQ

Frequently Asked Questions about Page Loading