Scrollarama Security & Risk Analysis

wordpress.org/plugins/scrollarama

Creates a loop of recent posts (up to 10) with images, within selected category, and scrolls through with jQuery effects

10 active installs v1.1.1 PHP + WP 3.0.1+ Updated May 12, 2011
cyclefeatured-postsjquerypostswidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Scrollarama Safe to Use in 2026?

Generally Safe

Score 85/100

Scrollarama has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The Scrollarama v1.1.1 plugin exhibits a seemingly strong security posture based on the provided static analysis and vulnerability history. The absence of any identified CVEs, unpatched vulnerabilities, and particularly the lack of "dangerous functions" and "taint flows" suggest a generally secure codebase. Furthermore, the use of prepared statements for SQL queries is a commendable security practice.

However, a significant concern arises from the "Output escaping" metric, which indicates that 0% of the 44 total outputs are properly escaped. This represents a substantial risk, as unescaped output is a primary vector for Cross-Site Scripting (XSS) vulnerabilities. While the plugin has no direct entry points like AJAX handlers, REST API routes, or shortcodes, and no identified taint flows, a single XSS vulnerability could still be exploited if the plugin's output is rendered within a user-facing context.

In conclusion, while the plugin benefits from a clean vulnerability history and good practices in handling SQL and avoiding dangerous functions, the complete lack of output escaping is a critical weakness that significantly elevates the risk profile. This oversight overshadows the other positive aspects and demands immediate attention.

Key Concerns

  • 0% of outputs properly escaped
Vulnerabilities
None known

Scrollarama Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Scrollarama Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
44
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped44 total outputs
Attack Surface

Scrollarama Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwidgets_initscrollarama.php:20
actionwp_headscrollarama.php:32
Maintenance & Trust

Scrollarama Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedMay 12, 2011
PHP min version
Downloads8K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Scrollarama Developer Profile

maltpress

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Scrollarama

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/scrollarama/scripts/jquery.cycle.all.min.js/wp-content/plugins/scrollarama/styles/scrollarama_style.css
Script Paths
/wp-content/plugins/scrollarama/scripts/jquery.cycle.all.min.js
Version Parameters
scrollarama/styles/scrollarama_style.css?ver=scrollarama/scripts/jquery.cycle.all.min.js?ver=

HTML / DOM Fingerprints

CSS Classes
pr_side_sliderpr_single_storypr_wrapper
Data Attributes
data-pr_effectsdata-pr_transitiondata-pr_timeoutdata-pr_custom_attributes
JS Globals
jQuery.fn.cycle
FAQ

Frequently Asked Questions about Scrollarama