PerformerJS Security & Risk Analysis

wordpress.org/plugins/performerjs

PerformerJS allows you to add really cool effects and features to your website by doing some simple editing of the HTML code in your pages.

10 active installs v1.0.5 PHP + WP 2.7+ Updated Apr 20, 2015
csshtmlinteractionjavascriptperformer
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PerformerJS Safe to Use in 2026?

Generally Safe

Score 85/100

PerformerJS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The performerjs plugin v1.0.5 exhibits a strong initial security posture based on the provided static analysis. The absence of any identified attack surface points, dangerous functions, file operations, external HTTP requests, or taint flows is highly encouraging. This suggests the plugin is designed with security in mind, avoiding common entry points for vulnerabilities. Furthermore, all SQL queries are prepared, and there is no recorded vulnerability history, indicating a history of stable and secure releases.

However, a significant concern arises from the output escaping analysis. With one total output and 0% properly escaped, any data rendered to the user interface is vulnerable to cross-site scripting (XSS) attacks. This is a critical weakness that could allow attackers to inject malicious scripts, steal user credentials, or perform other harmful actions. The use of an outdated bundled library, jQuery v1.0.4, also presents a potential risk, as older versions are often susceptible to known vulnerabilities that may not be addressed in this plugin's context.

In conclusion, while performerjs v1.0.5 demonstrates excellent security hygiene in its design and lack of historical vulnerabilities, the critical deficiency in output escaping and the outdated bundled library represent significant risks that must be addressed. The plugin is otherwise well-protected, but these specific issues expose it to common and dangerous attack vectors.

Key Concerns

  • Output escaping is not implemented
  • Bundled outdated library: jQuery v1.0.4
Vulnerabilities
None known

PerformerJS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

PerformerJS Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

jQuery1.0.4

Output Escaping

0% escaped1 total outputs
Attack Surface

PerformerJS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_headindex.php:37
actionwp_footerindex.php:38
Maintenance & Trust

PerformerJS Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedApr 20, 2015
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

PerformerJS Developer Profile

Chris Taylor

11 plugins · 460 total installs

81
trust score
Avg Security Score
81/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PerformerJS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/performerjs/performer.jquery.min.js/wp-content/plugins/performerjs/performer.mootools.min.js/wp-content/plugins/performerjs/performer.prototype.min.js
Script Paths
/wp-content/plugins/performerjs/performer.prototype.min.js/wp-content/plugins/performerjs/performer.mootools.min.js/wp-content/plugins/performerjs/performer.jquery.min.js
Version Parameters
performer.jquery.min.js?ver=performer.mootools.min.js?ver=performer.prototype.min.js?ver=

HTML / DOM Fingerprints

JS Globals
window.Prototypewindow.MooToolswindow.jQuery
FAQ

Frequently Asked Questions about PerformerJS