Slidr Security & Risk Analysis

wordpress.org/plugins/slidr

A clean, simple, responsive and touch-friendly Carousel with no bells and whistles but plenty of flexibility.

60 active installs v1.4.1 PHP + WP 4.0+ Updated Nov 5, 2023
carouselgalleryimage-carouselslideshowthumbnail-slider
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Slidr Safe to Use in 2026?

Generally Safe

Score 85/100

Slidr has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The slidr plugin v1.4.1 exhibits a generally good security posture based on the provided static analysis and vulnerability history. The absence of any recorded CVEs and the fact that all SQL queries are prepared are significant strengths. The plugin also has a limited attack surface, with all identified entry points (shortcodes) not explicitly marked as unprotected. Furthermore, the lack of file operations and external HTTP requests reduces potential avenues for attack.

However, a notable concern arises from the output escaping analysis, where only 19% of outputs are properly escaped. This indicates a significant risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data or dynamically generated content is not adequately sanitized before being displayed to the user. The absence of nonce checks and capability checks on the identified entry points, while not directly flagged as unprotected, is a potential weakness that could be exploited in conjunction with other vulnerabilities or if the shortcodes themselves handle sensitive data or actions.

In conclusion, while slidr v1.4.1 benefits from a clean vulnerability history and secure SQL practices, the poor output escaping and the potential for unauthenticated actions through shortcodes warrant attention. Addressing the output escaping issue is paramount to mitigating XSS risks. Further investigation into the shortcode functionality would be prudent to ensure no unintended consequences arise from the lack of explicit authorization checks.

Key Concerns

  • Low percentage of properly escaped output
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Slidr Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Slidr Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
34
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

19% escaped42 total outputs
Attack Surface

Slidr Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[gallery] inc\gallery-shortcode.php:4
[gallery] inc\gallery-shortcode.php:10
[slidr] inc\shortcode.php:113
WordPress Hooks 10
actionwp_enqueue_scriptscss\slidr-styles.php:8
actionwp_enqueue_scriptscss\slidr-styles.php:57
actionwp_print_scriptsinc\conditional.php:17
actionwp_print_stylesinc\conditional.php:18
actionwp_print_stylesinc\conditional.php:19
actionwp_print_stylesinc\conditional.php:20
actionwp_enqueue_scriptsinc\conditional.php:59
actionadmin_menuoptions.php:32
actionadmin_initoptions.php:33
actionwp_enqueue_scriptsslidr.php:41
Maintenance & Trust

Slidr Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedNov 5, 2023
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings3
Active installs60
Developer Profile

Slidr Developer Profile

Giorgos Sarigiannidis

7 plugins · 10K total installs

91
trust score
Avg Security Score
87/100
Avg Patch Time
5 days
View full developer profile
Detection Fingerprints

How We Detect Slidr

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Slidr