Pass URL Parameters to Embedded iFrame Security & Risk Analysis

wordpress.org/plugins/pass-url-parameters-to-embeded-iframe

Pass URL parameters from the embedded page URL to iframe source URL.

200 active installs v1.1.0 PHP + WP 6.7+ Updated Feb 12, 2026
eventbriteiframeparameters
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Pass URL Parameters to Embedded iFrame Safe to Use in 2026?

Generally Safe

Score 100/100

Pass URL Parameters to Embedded iFrame has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "pass-url-parameters-to-embeded-iframe" plugin version 1.1.0 appears to have a very strong security posture. The absence of any identified dangerous functions, unsanitized taint flows, or SQL queries not using prepared statements is highly commendable. Furthermore, the complete lack of known vulnerabilities, including critical or high severity ones, suggests a mature and secure development process. The code analysis shows that all identified outputs are properly escaped, and there are no file operations or external HTTP requests, which are common vectors for exploitation.

While the plugin exhibits excellent coding practices and a clean vulnerability history, the static analysis results indicate an extremely limited attack surface. With zero AJAX handlers, REST API routes, shortcodes, or cron events, there are no obvious entry points for attackers to leverage. The lack of explicit capability checks and nonce checks is not a concern in this specific instance due to the absence of these entry points. The plugin's strengths lie in its clean code and lack of historical issues, indicating a well-maintained and secure piece of software.

In conclusion, the "pass-url-parameters-to-embeded-iframe" plugin v1.1.0 demonstrates an exceptionally secure design and development. The static analysis reveals no exploitable code paths, and the vulnerability history is completely clear. This suggests a low-risk plugin. The only area for theoretical improvement would be the presence of these checks if any entry points were ever to be introduced in future versions, but as it stands, the plugin is remarkably secure.

Vulnerabilities
None known

Pass URL Parameters to Embedded iFrame Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Pass URL Parameters to Embedded iFrame Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Pass URL Parameters to Embedded iFrame Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_enqueue_scriptsrwc-pass-parameters-iframe.php:46
Maintenance & Trust

Pass URL Parameters to Embedded iFrame Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 12, 2026
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs200
Developer Profile

Pass URL Parameters to Embedded iFrame Developer Profile

Equalize Digital

4 plugins · 12K total installs

99
trust score
Avg Security Score
99/100
Avg Patch Time
6 days
View full developer profile
Detection Fingerprints

How We Detect Pass URL Parameters to Embedded iFrame

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pass-url-parameters-to-embeded-iframe/js/rwc-pass-parameters.js
Script Paths
/wp-content/plugins/pass-url-parameters-to-embeded-iframe/js/rwc-pass-parameters.js
Version Parameters
pass-url-parameters-to-embeded-iframe/js/rwc-pass-parameters.js?ver=1.1.0

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Pass URL Parameters to Embedded iFrame