SWE Osome Post Slider Security & Risk Analysis

wordpress.org/plugins/swe-osome-post-slider

Use Shortcode to display post slider or post carausal with title or short description in any where page , post or widget

0 active installs v3.0.1 PHP 5.2.4+ WP 3.0+ Updated May 2, 2019
carausalfull-width-slidermultiple-sliderpost-sliderslider-by-post-category
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is SWE Osome Post Slider Safe to Use in 2026?

Generally Safe

Score 85/100

SWE Osome Post Slider has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The swe-osome-post-slider plugin exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, SQL queries without prepared statements, file operations, external HTTP requests, and a clean taint analysis are all positive indicators. The plugin also has no recorded vulnerability history, which suggests a consistent track record of security. However, there are a few areas that warrant attention. The limited output escaping (50% properly escaped) means that some output might be vulnerable to cross-site scripting (XSS) attacks if not handled carefully by the calling context. Additionally, the lack of nonce and capability checks on its single shortcode presents a potential entry point for privilege escalation or unauthorized actions, especially if the shortcode's functionality is sensitive or can be manipulated by unauthenticated users.

While the plugin has a small attack surface and no known historical vulnerabilities, the identified weaknesses in output escaping and the absence of authorization checks on its shortcode create a tangible risk. The fact that 50% of outputs are not properly escaped is a significant concern, as it leaves room for XSS vulnerabilities. The lack of nonce and capability checks on the shortcode is another critical oversight, as it could allow unintended modifications or data exposure. These issues, combined, suggest that while the plugin avoids common pitfalls like raw SQL or dangerous functions, it has not implemented robust defenses against common web vulnerabilities.

In conclusion, swe-osome-post-slider v3.0.1 demonstrates good practices in several key security areas, but it is not without flaws. The lack of historical vulnerabilities is a strong positive, but the current code analysis highlights two specific areas of concern: insufficient output escaping and the absence of authorization checks on its shortcode. These represent the most immediate risks. Addressing these would significantly improve the plugin's security posture and reduce the likelihood of exploitation.

Key Concerns

  • Unescaped output
  • Shortcode without nonce/capability checks
Vulnerabilities
None known

SWE Osome Post Slider Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

SWE Osome Post Slider Release Timeline

v3.0
v2.0
v1.0
Code Analysis
Analyzed Apr 16, 2026

SWE Osome Post Slider Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped2 total outputs
Attack Surface

SWE Osome Post Slider Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[osomepost_slider] inc/osomepost_shortcode.php:133
WordPress Hooks 4
actionadmin_initswe-post-slider.php:36
actionadmin_menuswe-post-slider.php:40
actioninitswe-post-slider.php:54
actionadmin_enqueue_scriptsswe-post-slider.php:61
Maintenance & Trust

SWE Osome Post Slider Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.22
Last updatedMay 2, 2019
PHP min version5.2.4
Downloads8K

Community Trust

Rating100/100
Number of ratings3
Active installs0
Developer Profile

SWE Osome Post Slider Developer Profile

Sanjay

4 plugins · 400 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SWE Osome Post Slider

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/swe-osome-post-slider/assets/css/osome-slider.css/wp-content/plugins/swe-osome-post-slider/assets/css/swe.owl.carousel.min.css/wp-content/plugins/swe-osome-post-slider/assets/css/swe.owl.theme.default.min.css/wp-content/plugins/swe-osome-post-slider/assets/js/swe.owl.carousel.js/wp-content/plugins/swe-osome-post-slider/assets/css/admin-style.css
Script Paths
/wp-content/plugins/swe-osome-post-slider/assets/js/swe.owl.carousel.js
Version Parameters
swe-osome-post-slider/assets/js/swe.owl.carousel.js?ver=1.0.0

HTML / DOM Fingerprints

CSS Classes
owl-carouselowl-themeosome_slidercarausel_captionpost_excerpt_carauselitem
Data Attributes
id="owl_osome_slider_show-class="img-responsive"
JS Globals
jQuery
Shortcode Output
<div id="owl_osome_slider_show-</div></a><div class="item">
FAQ

Frequently Asked Questions about SWE Osome Post Slider