Related Videos for JW Player Security & Risk Analysis

wordpress.org/plugins/related-videos-for-jw-player

It creates the feed required from "Related Videos" add-on for JW Player, one for each Wordpress category.

10 active installs v1.2.1 PHP + WP 4.0+ Updated Feb 19, 2026
jw-playerplayerrelated-postsrelated-videosvideos
99
A · Safe
CVEs total1
Unpatched0
Last CVEApr 10, 2025
Safety Verdict

Is Related Videos for JW Player Safe to Use in 2026?

Generally Safe

Score 99/100

Related Videos for JW Player has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Apr 10, 2025Updated 1mo ago
Risk Assessment

The 'related-videos-for-jw-player' plugin, version 1.2.1, exhibits a mixed security posture. On one hand, the static analysis reveals a very small attack surface with no apparent entry points that lack authentication. Furthermore, all SQL queries observed utilize prepared statements, which is a strong security practice. File operations and external HTTP requests are also absent, reducing potential attack vectors.

However, concerns arise from the output escaping and taint analysis. A significant portion (59%) of outputs are not properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The presence of two unsanitized paths in the taint analysis, although not classified as critical or high severity in this scan, suggests potential for input manipulation that could lead to unintended behavior or vulnerabilities if not handled carefully. The plugin's vulnerability history also points to a past XSS vulnerability, reinforcing the concern around unescaped output.

While the plugin demonstrates good practices in areas like SQL and attack surface management, the lack of comprehensive output escaping and the presence of unsanitized taint flows are significant weaknesses that require attention. The absence of nonce and capability checks, combined with the unescaped outputs, creates a notable risk of XSS attacks, especially given the plugin's past vulnerability of this type.

Key Concerns

  • Unescaped output detected
  • Unsanitized paths in taint flows
  • Past XSS vulnerability noted
  • No nonce checks
  • No capability checks
Vulnerabilities
1

Related Videos for JW Player Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-32516medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Related Videos for JW Player <= 1.2.0 - Reflected Cross-Site Scripting

Apr 10, 2025 Patched in 1.2.1 (323d)
Code Analysis
Analyzed Mar 16, 2026

Related Videos for JW Player Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
12 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

41% escaped29 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
rvjwp_options (includes\rvjwp-admin-settings.php:40)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Related Videos for JW Player Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menuincludes\rvjwp-admin-settings.php:4
actionadmin_initincludes\rvjwp-admin-settings.php:5
actioninitincludes\rvjwp-admin-settings.php:6
actionplugins_loadedrelated-videos-for-jwplayer.php:18
actioninitrelated-videos-for-jwplayer.php:23
Maintenance & Trust

Related Videos for JW Player Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 19, 2026
PHP min version
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Related Videos for JW Player Developer Profile

ilGhera

13 plugins · 2K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
129 days
View full developer profile
Detection Fingerprints

How We Detect Related Videos for JW Player

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/related-videos-for-jw-player/css/rvjwp-style.css/wp-content/plugins/related-videos-for-jw-player/js/rvjwp-script.js
Script Paths
/wp-content/plugins/related-videos-for-jw-player/js/rvjwp-script.js
Version Parameters
related-videos-for-jw-player/css/rvjwp-style.css?ver=related-videos-for-jw-player/js/rvjwp-script.js?ver=

HTML / DOM Fingerprints

CSS Classes
rvjwp-code
Data Attributes
id="rvjwp-options"name="rvjwp-options"id="thumbnail"name="thumbnail"id="field"name="field"+6 more
JS Globals
myAjax
Shortcode Output
<span class="code">'related': {'file': '?feed=related-feed
FAQ

Frequently Asked Questions about Related Videos for JW Player