Podlove Web Player Security & Risk Analysis

wordpress.org/plugins/podlove-web-player

The fast, flexible and responsive podcast player powered by podlove meta data.

4K active installs v5.9.2 PHP 7.2+ WP 4.9.6+ Updated Jan 2, 2026
audiopodcasting
95
A · Safe
CVEs total3
Unpatched0
Last CVEMar 3, 2026
Safety Verdict

Is Podlove Web Player Safe to Use in 2026?

Generally Safe

Score 95/100

Podlove Web Player has a strong security track record. Known vulnerabilities have been patched promptly.

3 known CVEsLast CVE: Mar 3, 2026Updated 3mo ago
Risk Assessment

The static analysis of Podlove Web Player v5.9.2 reveals a generally robust security posture with several good practices in place. Notably, the plugin uses prepared statements exclusively for SQL queries and ensures all identified output is properly escaped, mitigating common injection and XSS risks. It also enforces capability checks on its entry points and has a limited attack surface with no exposed AJAX handlers or REST API routes without authentication. However, the absence of nonce checks is a significant concern, potentially leaving the shortcode entry points vulnerable to CSRF attacks if they interact with sensitive functionality.

The vulnerability history, however, presents a considerable red flag. With a total of three known CVEs, including one high and two medium severity vulnerabilities, the plugin has a track record of security flaws. The types of past vulnerabilities (Deserialization, Missing Authorization, XSS) align with some of the potential risks that can arise from plugins with unprotected entry points or improper input handling. The fact that the last vulnerability was in 2026 suggests a recent but potentially resolved issue, yet the historical pattern demands caution.

In conclusion, while Podlove Web Player v5.9.2 demonstrates good development practices in its current code, its past vulnerability history and the lack of nonce checks on its shortcodes introduce notable risks. The plugin has strong internal controls for data handling, but the external attack vectors related to authorization and CSRF remain a concern, especially given its past issues. Users should remain vigilant and ensure they are on the latest patched version.

Key Concerns

  • Missing nonce checks on entry points
  • Known past vulnerabilities (1 High, 2 Medium)
Vulnerabilities
3

Podlove Web Player Security Vulnerabilities

CVEs by Year

2 CVEs in 2024
2024
1 CVE in 2026
2026
Patched Has unpatched

Severity Breakdown

High
1
Medium
2

3 total CVEs

CVE-2026-24385high · 7.5Deserialization of Untrusted Data

Podlove Web Player <= 5.9.1 - Authenticated (Contributor+) PHP Object Injection

Mar 3, 2026 Patched in 5.9.2 (10d)
CVE-2024-35710medium · 5.3Missing Authorization

Podlove Web Player <= 5.7.3 - Missing Authorization to Unauthenticated Information Exposure

Jun 6, 2024 Patched in 5.7.4 (8d)
CVE-2024-29788medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Podlove Web Player <= 5.7.1 - Authenticated (Contributor+) Stored Cross-Site Scripting

Mar 25, 2024 Patched in 5.7.3 (214d)
Code Analysis
Analyzed Mar 16, 2026

Podlove Web Player Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
2
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

Podlove Web Player Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[podloveaudio] public\class-podlove-web-player-public.php:146
[podlove-web-player] public\class-podlove-web-player-public.php:147
[podlove-episode-web-player] public\class-podlove-web-player-public.php:150
WordPress Hooks 15
actioninitincludes\class-podlove-web-player-embed-api.php:55
actioninitincludes\class-podlove-web-player-shortcode.php:81
actionplugins_loadedincludes\class-podlove-web-player.php:168
actionadmin_enqueue_scriptsincludes\class-podlove-web-player.php:181
actionadmin_enqueue_scriptsincludes\class-podlove-web-player.php:182
actionadmin_menuincludes\class-podlove-web-player.php:183
actionrest_api_initincludes\class-podlove-web-player.php:184
actioninitincludes\class-podlove-web-player.php:198
actioninitincludes\class-podlove-web-player.php:199
actionrest_api_initincludes\class-podlove-web-player.php:200
actionwpincludes\class-podlove-web-player.php:201
actionwp_enqueue_scriptsincludes\class-podlove-web-player.php:202
actionwp_enqueue_scriptsincludes\class-podlove-web-player.php:203
actionenqueue_block_editor_assetsincludes\class-podlove-web-player.php:216
filterthe_contentpublic\class-podlove-web-player-public.php:164
Maintenance & Trust

Podlove Web Player Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJan 2, 2026
PHP min version7.2
Downloads192K

Community Trust

Rating74/100
Number of ratings14
Active installs4K
Developer Profile

Podlove Web Player Developer Profile

gerritvanaaken

1 plugin · 4K total installs

85
trust score
Avg Security Score
95/100
Avg Patch Time
77 days
View full developer profile
Detection Fingerprints

How We Detect Podlove Web Player

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/podlove-web-player/admin/js/app.js/wp-content/plugins/podlove-web-player/block/js/block.js/wp-content/plugins/podlove-web-player/js/public.js
Script Paths
/wp-content/plugins/podlove-web-player/admin/js/app.js/wp-content/plugins/podlove-web-player/block/js/block.js/wp-content/plugins/podlove-web-player/js/public.js
Version Parameters
podlove-web-player/admin/js/app.js?ver=podlove-web-player/block/js/block.js?ver=podlove-web-player/js/public.js?ver=

HTML / DOM Fingerprints

CSS Classes
podlove-web-player-container
Data Attributes
data-podlove-web-player
JS Globals
PODLOVE_WEB_PLAYER
REST Endpoints
/wp-json/podlove-web-player/v1/config/wp-json/podlove-web-player/v1/audio
Shortcode Output
[podlove-web-player
FAQ

Frequently Asked Questions about Podlove Web Player