
Pass URL Parameters to Embedded iFrame Security & Risk Analysis
wordpress.org/plugins/pass-url-parameters-to-embeded-iframePass URL parameters from the embedded page URL to iframe source URL.
Is Pass URL Parameters to Embedded iFrame Safe to Use in 2026?
Generally Safe
Score 100/100Pass URL Parameters to Embedded iFrame has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
Based on the provided static analysis and vulnerability history, the "pass-url-parameters-to-embeded-iframe" plugin version 1.1.0 appears to have a very strong security posture. The absence of any identified dangerous functions, unsanitized taint flows, or SQL queries not using prepared statements is highly commendable. Furthermore, the complete lack of known vulnerabilities, including critical or high severity ones, suggests a mature and secure development process. The code analysis shows that all identified outputs are properly escaped, and there are no file operations or external HTTP requests, which are common vectors for exploitation.
While the plugin exhibits excellent coding practices and a clean vulnerability history, the static analysis results indicate an extremely limited attack surface. With zero AJAX handlers, REST API routes, shortcodes, or cron events, there are no obvious entry points for attackers to leverage. The lack of explicit capability checks and nonce checks is not a concern in this specific instance due to the absence of these entry points. The plugin's strengths lie in its clean code and lack of historical issues, indicating a well-maintained and secure piece of software.
In conclusion, the "pass-url-parameters-to-embeded-iframe" plugin v1.1.0 demonstrates an exceptionally secure design and development. The static analysis reveals no exploitable code paths, and the vulnerability history is completely clear. This suggests a low-risk plugin. The only area for theoretical improvement would be the presence of these checks if any entry points were ever to be introduced in future versions, but as it stands, the plugin is remarkably secure.
Pass URL Parameters to Embedded iFrame Security Vulnerabilities
Pass URL Parameters to Embedded iFrame Code Analysis
Pass URL Parameters to Embedded iFrame Attack Surface
WordPress Hooks 1
Maintenance & Trust
Pass URL Parameters to Embedded iFrame Maintenance & Trust
Maintenance Signals
Community Trust
Pass URL Parameters to Embedded iFrame Alternatives
iframe
iframe
[iframe src="http://www.youtube.com/embed/7_nAZQt9qu0" width="100%" height="500"] shortcode
Advanced iFrame
advanced-iframe
Include content the way YOU like in an iframe that can hide and modify elements, does auto-height, forward parameters and does many, many more...
BJ Lazy Load
bj-lazy-load
Lazy loading for images and iframes makes your site load faster and saves bandwidth. Uses no external JS libraries and degrades gracefully for non-js …
Embed Privacy
embed-privacy
Embed Privacy prevents the loading of embedded external content and allows your site visitors to opt-in.
URL Params
url-params
Short Code to grab any URL parameter from the Query String and display it or display conditional content.
Pass URL Parameters to Embedded iFrame Developer Profile
4 plugins · 12K total installs
How We Detect Pass URL Parameters to Embedded iFrame
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/pass-url-parameters-to-embeded-iframe/js/rwc-pass-parameters.js/wp-content/plugins/pass-url-parameters-to-embeded-iframe/js/rwc-pass-parameters.jspass-url-parameters-to-embeded-iframe/js/rwc-pass-parameters.js?ver=1.1.0