Storefront Add Slider Security & Risk Analysis

wordpress.org/plugins/storefront-add-slider

Lets you add any slider shortcode to your Storefront theme Frontpage.

900 active installs v0.4 PHP 5.2.4+ WP 3.8+ Updated Sep 27, 2017
ecommerceherosliderstorefrontwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Storefront Add Slider Safe to Use in 2026?

Generally Safe

Score 85/100

Storefront Add Slider has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "storefront-add-slider" plugin, version 0.4, exhibits a generally strong security posture based on the provided static analysis. The plugin reports zero AJAX handlers, REST API routes, shortcodes, and cron events, indicating a minimal attack surface. Furthermore, there are no identified dangerous functions or file operations. The absence of external HTTP requests and the use of prepared statements for all SQL queries are excellent security practices.

However, there are some areas for improvement. The plugin has a 60% rate of properly escaped output, meaning 40% of its outputs are not being escaped, which could potentially lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is outputted directly. The complete lack of nonce checks and capability checks across all entry points is a significant concern, as it implies that any authenticated user, regardless of their role or permissions, could potentially trigger actions within the plugin. While taint analysis shows no current unsanitized flows, the lack of input validation and permission checks makes it more susceptible should any data be processed in the future.

The vulnerability history shows zero known CVEs, which is a positive sign and suggests a history of secure development. However, this should not be taken as a guarantee of future security, especially given the identified weaknesses in output escaping and the complete absence of authorization checks.

Key Concerns

  • Unescaped output (40%)
  • Missing nonce checks on entry points
  • Missing capability checks on entry points
Vulnerabilities
None known

Storefront Add Slider Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Storefront Add Slider Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

60% escaped5 total outputs
Attack Surface

Storefront Add Slider Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioncustomize_registerstorefront-add-slider.php:28
actionstorefront_before_contentstorefront-add-slider.php:111
actionhomepagestorefront-add-slider.php:114
Maintenance & Trust

Storefront Add Slider Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedSep 27, 2017
PHP min version5.2.4
Downloads34K

Community Trust

Rating20/100
Number of ratings2
Active installs900
Developer Profile

Storefront Add Slider Developer Profile

Atlantis Themes

2 plugins · 910 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Storefront Add Slider

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
front__slider
Shortcode Output
<section class="front__slider">
FAQ

Frequently Asked Questions about Storefront Add Slider