STL Viewer Security & Risk Analysis

wordpress.org/plugins/stl-viewer

With a simple shortcode you can enable and embed a WebGL viewer to show 3d stl files.

100 active installs v1.1 PHP + WP 3.0+ Updated Mar 15, 2015
3d3d-printingshortcodestlviewer
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is STL Viewer Safe to Use in 2026?

Generally Safe

Score 85/100

STL Viewer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'stl-viewer' plugin v1.1 exhibits a mixed security posture. On the positive side, it has no known vulnerabilities (CVEs) and demonstrates good practices by exclusively using prepared statements for SQL queries and having no external HTTP requests or cron events. The attack surface, while containing two shortcodes, currently has no identified unprotected entry points.

However, significant concerns arise from the static analysis. The most glaring issue is that 100% of its outputs are unescaped, presenting a high risk of Cross-Site Scripting (XSS) vulnerabilities. Additionally, there are no nonce checks, which is a critical oversight for any handler that could potentially be triggered by an authenticated user, further increasing the risk of unauthorized actions. While taint analysis shows no current flows, the lack of output escaping means any potential taint could lead to severe consequences.

Given the absence of past vulnerabilities, it's difficult to draw definitive patterns, but this could indicate either a very stable codebase or simply a lack of prior rigorous security auditing. The current analysis highlights a critical weakness in output sanitization and a concerning lack of protective measures like nonce checks, outweighing the positive aspects of its SQL handling and vulnerability history. The plugin's overall security is compromised by these critical omissions.

Key Concerns

  • 100% of outputs are unescaped
  • No nonce checks found
  • Capability check is only present on 1 out of 2 entry points
Vulnerabilities
None known

STL Viewer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

STL Viewer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

STL Viewer Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[stl] stl.php:32
[webgl_test] stl.php:33
WordPress Hooks 4
actionadmin_initsettings.php:93
actionadmin_menusettings.php:95
actionwp_enqueue_scriptsstl.php:38
actionwp_footerstl.php:39
Maintenance & Trust

STL Viewer Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedMar 15, 2015
PHP min version
Downloads8K

Community Trust

Rating100/100
Number of ratings5
Active installs100
Developer Profile

STL Viewer Developer Profile

christian.loelkes

3 plugins · 120 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect STL Viewer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/stl-viewer/js/three.min.js/wp-content/plugins/stl-viewer/js/STLLoader.js/wp-content/plugins/stl-viewer/js/TrackballControls.js/wp-content/plugins/stl-viewer/js/Detector.js/wp-content/plugins/stl-viewer/js/STLViewer.js
Script Paths
/wp-content/plugins/stl-viewer/js/STLViewer.js

HTML / DOM Fingerprints

JS Globals
THREE.EulerTHREE.Vector3
Shortcode Output
<div id="progress" style="width: 100%; text-align: center"><div id="webGLError" style="width: 100%; text-align: center"><div id="canvas" style="width:height:
FAQ

Frequently Asked Questions about STL Viewer