Screen Snow Security & Risk Analysis

wordpress.org/plugins/screen-snow

Screen Snow is a plugin that add snow effect to the wordpress site.

10 active installs v1.0.0 PHP + WP 4.0+ Updated Jul 22, 2015
christmasscreen-snowsite-snowsnowsnow-effect
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Screen Snow Safe to Use in 2026?

Generally Safe

Score 85/100

Screen Snow has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'screen-snow' plugin v1.0.0 demonstrates a very limited attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events. This lack of entry points is a strong indicator of a secure design in terms of external interaction points. Furthermore, the plugin utilizes prepared statements for all its SQL queries, which is an excellent practice for preventing SQL injection vulnerabilities.

However, the analysis reveals significant concerns regarding output escaping. With 100% of its outputs being unescaped, this plugin presents a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data displayed to users could potentially be manipulated to inject malicious scripts, leading to session hijacking, defacement, or other client-side attacks. The absence of any recorded vulnerability history might be misleading, as the lack of past issues doesn't guarantee future security, especially given the critical issue with unescaped output.

In conclusion, while the plugin excels in minimizing its attack surface and employing secure database practices, the pervasive lack of output escaping is a critical flaw that severely undermines its security posture. This single issue creates a substantial risk of XSS attacks. Users should be extremely cautious, and immediate remediation of the output escaping is strongly recommended.

Key Concerns

  • Outputs are not properly escaped
Vulnerabilities
None known

Screen Snow Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Screen Snow Release Timeline

v1.0
Code Analysis
Analyzed Apr 16, 2026

Screen Snow Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

Screen Snow Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_enqueue_scriptssnow-admin.php:9
actionadmin_enqueue_scriptssnow-admin.php:10
actionwp_footersnow-settings.php:21
actionadmin_menusnow-settings.php:22
actionadmin_initsnow-settings.php:23
Maintenance & Trust

Screen Snow Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedJul 22, 2015
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Screen Snow Developer Profile

Haandvaerkeren

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Screen Snow

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/screen-snow/css/ts.css/wp-content/plugins/screen-snow/js/jscolor.js/wp-content/plugins/screen-snow/imgs/menuicon.png/wp-content/plugins/screen-snow/imgs/snow.png/wp-content/plugins/screen-snow/css/ss.css/wp-content/plugins/screen-snow/js/snow.min.js/wp-content/plugins/screen-snow/js/apply.js
Script Paths
js/jscolor.jsjs/snow.min.jsjs/apply.js

HTML / DOM Fingerprints

CSS Classes
color
HTML Comments
<![if lte IE 9]><![endif]--><!--[if !IE]> --><!-- <![endif]-->
Data Attributes
name="snow_density"name="snow_color"name="snow_speed"name="snow_size"
JS Globals
snow_php_vars
FAQ

Frequently Asked Questions about Screen Snow