Slideshow Reloaded Security & Risk Analysis

wordpress.org/plugins/slideshow-reloaded

Integrate a fancy slideshow with JQuery.

100 active installs v1.0.2 PHP + WP 3.5+ Updated Sep 29, 2019
carouselgalleryphotosliderslideshow
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Slideshow Reloaded Safe to Use in 2026?

Generally Safe

Score 85/100

Slideshow Reloaded has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "slideshow-reloaded" plugin v1.0.2 presents a generally positive security posture based on the provided static analysis. There are no identified CVEs, indicating a lack of historically exploited vulnerabilities. The plugin demonstrates good practices by utilizing prepared statements for all SQL queries and performing capability checks. However, a significant concern is the presence of the "unserialize" function, which, without proper sanitization of the input data, can lead to Remote Code Execution (RCE) vulnerabilities.

While the static analysis shows no explicit taint flows or unsanitized paths, the inherent risk associated with "unserialize" remains. Additionally, a substantial portion of the plugin's output (63%) is not properly escaped, which could expose the application to Cross-Site Scripting (XSS) vulnerabilities. The limited attack surface reported (0 entry points) is a positive indicator, but the lack of detail on how data is processed before being passed to "unserialize" means that the actual risk is difficult to fully quantify without deeper dynamic analysis or code review. The absence of AJAX handlers and REST API routes without authentication checks is commendable.

In conclusion, while the plugin avoids common pitfalls like unpatched CVEs and raw SQL queries, the use of "unserialize" and the high percentage of unescaped output are critical weaknesses that significantly elevate the risk profile. The lack of a recorded vulnerability history might be a testament to good development practices or simply an absence of discovery, but the identified code signals necessitate caution. The plugin's strengths lie in its SQL handling and authentication checks, but these are overshadowed by the potential for serious vulnerabilities due to the "unserialize" function and output escaping issues.

Key Concerns

  • Dangerous function "unserialize" used
  • 37% of outputs properly escaped
Vulnerabilities
None known

Slideshow Reloaded Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Slideshow Reloaded Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
99
58 escaped
Nonce Checks
3
Capability Checks
4
File Operations
2
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$cp = unserialize(~$val);includes\class-functions.php:362

Output Escaping

37% escaped157 total outputs
Attack Surface

Slideshow Reloaded Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 18
actionadmin_initincludes\SlideshowReloadedGeneralSettings.php:61
actionadmin_menuincludes\SlideshowReloadedGeneralSettings.php:64
actionadmin_enqueue_scriptsincludes\SlideshowReloadedGeneralSettings.php:67
actionwpincludes\SlideshowReloadedInstaller.php:36
actioninitincludes\SlideshowReloadedPostType.php:20
actionsave_postincludes\SlideshowReloadedPostType.php:21
actionadmin_enqueue_scriptsincludes\SlideshowReloadedPostType.php:22
actionadmin_action_slideshow_reloaded_duplicate_slideshowincludes\SlideshowReloadedPostType.php:24
filterpost_updated_messagesincludes\SlideshowReloadedPostType.php:26
filterpost_row_actionsincludes\SlideshowReloadedPostType.php:27
actionmedia_buttonsincludes\SlideshowReloadedShortcode.php:38
actionadmin_enqueue_scriptsincludes\SlideshowReloadedShortcode.php:41
actionwp_enqueue_scriptsincludes\SlideshowReloadedSlideshowStylesheet.php:18
actioninitslideshow.php:43
actionwp_enqueue_scriptsslideshow.php:46
actionadmin_enqueue_scriptsslideshow.php:47
actionslideshow_reloadedslideshow.php:59
actionwidgets_initslideshow.php:65
Maintenance & Trust

Slideshow Reloaded Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedSep 29, 2019
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

Slideshow Reloaded Developer Profile

lerougeliet

5 plugins · 230 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Slideshow Reloaded

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/slideshow-reloaded/public/js/main.js/wp-content/plugins/slideshow-reloaded/public/js/admin.js/wp-content/plugins/slideshow-reloaded/public/css/admin.css/wp-content/plugins/slideshow-reloaded/public/css/main.css
Script Paths
/wp-content/plugins/slideshow-reloaded/public/js/main.js/wp-content/plugins/slideshow-reloaded/public/js/admin.js
Version Parameters
slideshow-reloaded/public/js/main.js?ver=slideshow-reloaded/public/js/admin.js?ver=slideshow-reloaded/public/css/admin.css?ver=slideshow-reloaded/public/css/main.css?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- WordPress Slideshow - No slideshows available -->
JS Globals
slideshow_reloaded_script_adminURL
FAQ

Frequently Asked Questions about Slideshow Reloaded