RSS News Scroller is a simple news scroller which you can use by just activating it.

10 active installs v1.0.0 PHP + WP 3.0.1+ Updated Apr 21, 2015
feedsnewsrss
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is RSS News Scroller Safe to Use in 2026?

Generally Safe

Score 85/100

RSS News Scroller has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "rss-news-scroller-by-pierpaolo-romanelli" plugin, at version 1.0.0, exhibits a generally positive security posture based on the provided static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the reliance on prepared statements for all SQL queries and the lack of file operations and external HTTP requests are strong indicators of secure coding practices. However, a significant concern arises from the complete lack of output escaping, with 15 total outputs found and 0% properly escaped. This means that any data rendered by the plugin, if it originates from user input or external sources, is highly susceptible to Cross-Site Scripting (XSS) attacks. While the taint analysis did not flag critical or high severity unsanitized paths, the presence of two flows with unsanitized paths, combined with the unescaped output, presents a tangible risk. The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive sign, but it doesn't mitigate the immediate risk of unescaped output. In conclusion, while the plugin avoids common pitfalls related to attack surface and data handling (SQL, file operations), the critical oversight in output escaping creates a substantial vulnerability that needs immediate attention.

Key Concerns

  • All outputs are unescaped
  • Unsanitized paths found in taint analysis
Vulnerabilities
None known

RSS News Scroller Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

RSS News Scroller Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped15 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
npr_option (rss-news-by-pierpaolo-romanelli.php:181)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

RSS News Scroller Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwp_footerrss-news-by-pierpaolo-romanelli.php:65
actionadmin_menurss-news-by-pierpaolo-romanelli.php:283
actionplugins_loadedrss-news-by-pierpaolo-romanelli.php:284
actioninitrss-news-by-pierpaolo-romanelli.php:287
actionwp_enqueue_scriptsrss-news-by-pierpaolo-romanelli.php:288
Maintenance & Trust

RSS News Scroller Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedApr 21, 2015
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

RSS News Scroller Developer Profile

programmo

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect RSS News Scroller

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/rss-news-scroller-by-pierpaolo-romanelli/jqueryslider/jquery.bxslider.css/wp-content/plugins/rss-news-scroller-by-pierpaolo-romanelli/jqueryslider/jquery.bxslider.min.js
Script Paths
/wp-content/plugins/rss-news-scroller-by-pierpaolo-romanelli/jqueryslider/jquery.bxslider.min.js

HTML / DOM Fingerprints

CSS Classes
slide
Data Attributes
id="npr_banner"class="slider1"
JS Globals
jQuery
FAQ

Frequently Asked Questions about RSS News Scroller