PWP Lytebox Security & Risk Analysis

wordpress.org/plugins/pwp-lytebox

The fast and simple way to make all links pointing to images open in popup modal window.

40 active installs v1.3.2 PHP + WP 3.5.0+ Updated Oct 24, 2015
light-boxlightboxlyteboxmodal-window-imagespopup-images
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PWP Lytebox Safe to Use in 2026?

Generally Safe

Score 85/100

PWP Lytebox has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The pwp-lytebox plugin version 1.3.2 exhibits a generally strong security posture based on the provided static analysis. The absence of any recorded vulnerabilities in its history and the lack of identified critical or high severity issues in the taint analysis are very positive indicators. Furthermore, the code signals suggest good development practices with no dangerous functions, no file operations, and all SQL queries utilizing prepared statements. The plugin also avoids external HTTP requests and does not bundle external libraries, reducing potential attack vectors.

However, there are some areas that warrant attention. The lack of any observed nonce checks or capability checks across the identified entry points (even though the total is zero) suggests a potential blind spot. If future versions introduce new AJAX handlers, REST API routes, or shortcodes, these would be prime candidates for requiring proper authentication and authorization. The 75% output escaping rate, while good, means there's a 25% chance of unescaped output, which could lead to cross-site scripting (XSS) vulnerabilities if sensitive data is displayed without proper sanitization.

In conclusion, pwp-lytebox v1.3.2 appears to be a relatively secure plugin with a clean history. Its adherence to prepared statements for SQL and lack of dangerous functions are commendable. The primary areas for improvement lie in ensuring robust authorization and authentication mechanisms are implemented for any future introduced entry points and in achieving 100% output escaping to eliminate potential XSS risks.

Key Concerns

  • Output escaping is not 100%
  • No nonce or capability checks observed
Vulnerabilities
None known

PWP Lytebox Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

PWP Lytebox Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

75% escaped4 total outputs
Attack Surface

PWP Lytebox Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitmain.php:29
actionwp_enqueue_scriptsmain.php:32
actionadmin_menumain.php:39
actionadmin_initmain.php:40
filterplugin_action_linksmain.php:42
filterthe_contentmain.php:45
Maintenance & Trust

PWP Lytebox Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedOct 24, 2015
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

PWP Lytebox Developer Profile

polkan

1 plugin · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PWP Lytebox

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pwp-lytebox/lytebox/lytebox.css/wp-content/plugins/pwp-lytebox/scripts.js/wp-content/plugins/pwp-lytebox/lytebox/lytebox.js
Script Paths
/wp-content/plugins/pwp-lytebox/lytebox/lytebox.js
Version Parameters
pwp-lytebox/lytebox.css?ver=pwp-lytebox/scripts.js?ver=pwp-lytebox/lytebox/lytebox.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-lyte-options
JS Globals
pwpl
FAQ

Frequently Asked Questions about PWP Lytebox