Shortcodes for Rumble Security & Risk Analysis

wordpress.org/plugins/shortcodes-for-rumble

Being that there wasn't a plugin to ensure a good video embed of Rumble videos, Shortcodes for Rumble was born. Simple to use and developer frien …

50 active installs v1.0.0 PHP 7.2+ WP 5.8.2+ Updated Dec 18, 2021
responsive-videosrumblevideo-embedwordpress
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Shortcodes for Rumble Safe to Use in 2026?

Generally Safe

Score 85/100

Shortcodes for Rumble has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The plugin "shortcodes-for-rumble" v1.0.0 exhibits a generally good security posture based on the provided static analysis. The plugin does not utilize dangerous functions, all SQL queries are prepared, and the vast majority of outputs are properly escaped, indicating a mindful approach to preventing common web vulnerabilities. The absence of file operations and external HTTP requests also reduces the attack surface. Furthermore, the lack of known vulnerabilities in its history suggests a stable and secure codebase up to this point.

However, there are significant areas for concern. The complete absence of nonce checks and capability checks is a critical oversight, especially for any plugin that might interact with user data or execute actions. While the current analysis shows no unprotected entry points (AJAX handlers, REST API routes), this is likely due to the fact that these entry points do not exist. The single shortcode is the sole entry point, and without proper nonce or capability checks, it could potentially be exploited if it performs any sensitive actions or processes user-provided data, even if that data is currently escaped.

The plugin's attack surface is extremely small, with only one shortcode acting as an entry point. This, combined with the lack of known vulnerabilities, is a positive indicator. However, the reliance on output escaping without robust authorization checks (nonces, capabilities) is a structural weakness. The plugin should implement these checks to ensure that only authorized users can trigger the shortcode's functionality, thereby solidifying its security.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Minor unescaped output detected
Vulnerabilities
None known

Shortcodes for Rumble Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Shortcodes for Rumble Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
10 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

91% escaped11 total outputs
Attack Surface

Shortcodes for Rumble Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[rumblevid] shortcodes-rumble.php:30
Maintenance & Trust

Shortcodes for Rumble Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedDec 18, 2021
PHP min version7.2
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs50
Developer Profile

Shortcodes for Rumble Developer Profile

WMEric

2 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Shortcodes for Rumble

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
rumble-video-container
Shortcode Output
<div style="position: relative; padding-bottom: calc(var(--aspect-ratio, .5625) * 100%); margin: 0 auto;" class="rumble-video-container"><video controls controlsList="nodownload" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; background: #000;" preload="metadata" src="" poster=""></video></div>
FAQ

Frequently Asked Questions about Shortcodes for Rumble