swfObject Reloaded Security & Risk Analysis

wordpress.org/plugins/swfobject-reloaded

Allows easy embedding (shortcode inserted via Add Media button while posting) and better management of swf files.

200 active installs v1.6 PHP + WP 2.9+ Updated Oct 11, 2012
animationflashflexmediaswf
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is swfObject Reloaded Safe to Use in 2026?

Generally Safe

Score 85/100

swfObject Reloaded has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The swfobject-reloaded plugin v1.6 exhibits a generally good security posture based on the provided static analysis and vulnerability history. The absence of any known CVEs, dangerous functions, direct SQL queries (all prepared statements), file operations, or external HTTP requests is commendable. Crucially, all identified entry points (shortcodes) are reported as unprotected. This suggests the plugin is designed with a focus on preventing common attack vectors.

However, a significant concern is the complete lack of output escaping for all 12 identified outputs. This means that any data processed or displayed by the plugin, if originating from untrusted sources, could be vulnerable to cross-site scripting (XSS) attacks. The absence of nonce and capability checks on the entry points, while not directly linked to a vulnerability in this specific version due to no recorded issues, represents a potential gap that could be exploited if the plugin's functionality were to change or new vulnerabilities were discovered in the future. The lack of taint analysis data is neutral, as it could indicate no flows were found or that the analysis was not performed.

In conclusion, while the plugin has a clean vulnerability history and avoids many risky coding practices, the universal lack of output escaping presents a clear and present danger. The absence of robust authentication and authorization checks on its entry points, though not currently exploited, also warrants attention. Addressing the output escaping issue should be the top priority to mitigate XSS risks.

Key Concerns

  • No output escaping for any output
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

swfObject Reloaded Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

swfObject Reloaded Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped12 total outputs
Attack Surface

swfObject Reloaded Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[swfobject] wp_swf_shortcode.php:4
[swflink] wp_swf_shortcode.php:5
WordPress Hooks 6
actionadmin_initwp_swf_media_options.php:33
actioninitwp_swf_object.php:33
filterattachment_fields_to_editwp_swf_shortcode.php:6
filterattachment_fields_to_savewp_swf_shortcode.php:7
filtermedia_send_to_editorwp_swf_shortcode.php:8
filterthe_contentwp_swf_shortcode.php:10
Maintenance & Trust

swfObject Reloaded Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedOct 11, 2012
PHP min version
Downloads33K

Community Trust

Rating100/100
Number of ratings1
Active installs200
Developer Profile

swfObject Reloaded Developer Profile

CodeAndReload

4 plugins · 370 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect swfObject Reloaded

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
swfobject
Shortcode Output
[swfobject][swflink]
FAQ

Frequently Asked Questions about swfObject Reloaded