SWFPut – SWFlash Put Security & Risk Analysis

wordpress.org/plugins/swfput

SWFPut provides video players for posts and pages and widget areas, as both HTML5 and flash video.

30 active installs v3.1.0.1 PHP + WP 4.3+ Updated Aug 12, 2020
flash-videographicshtml5-videovideovideo-player
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SWFPut – SWFlash Put Safe to Use in 2026?

Generally Safe

Score 85/100

SWFPut – SWFlash Put has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The swfput plugin v3.1.0.1 presents a mixed security profile. The static analysis reveals a commendable absence of direct attack vectors like unprotected AJAX handlers, REST API routes, or shortcodes. Furthermore, the plugin demonstrates good practices by exclusively using prepared statements for its SQL queries and employing a significant number of capability checks (18). However, a critical concern arises from the output escaping, with only 2% of 170 outputs being properly escaped. This indicates a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, where user-supplied data, if not properly handled, could be injected and executed in the browser. The taint analysis also flagged one flow with an unsanitized path, which, while not critical or high severity, warrants attention as it represents a potential avenue for unauthorized file access or manipulation.

The plugin's vulnerability history is remarkably clean, with zero recorded CVEs. This lack of past vulnerabilities is a positive indicator, suggesting either a diligent development history or that the plugin's limited functionality hasn't attracted significant malicious attention. However, it is crucial not to solely rely on the absence of history. The identified output escaping issue and the unsanitized path flow in the static and taint analyses represent active, inherent risks that must be addressed independently of past security incidents. In conclusion, swfput shows strengths in its limited attack surface and SQL handling, but its weak output escaping and a single unsanitized path flow represent significant security weaknesses that require immediate remediation.

Key Concerns

  • Low percentage of properly escaped output
  • Unsanitized path in taint analysis
  • No nonce checks
Vulnerabilities
None known

SWFPut – SWFlash Put Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

SWFPut – SWFlash Put Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
167
3 escaped
Nonce Checks
0
Capability Checks
18
File Operations
3
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

2% escaped170 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
<mce_ifm> (mce_ifm.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

SWFPut – SWFlash Put Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 16
actionadmin_menuOptions_0_0_2b.inc.php:102
actionadmin_initOptions_0_0_2b.inc.php:104
actioninitswfput.php:342
actionwidgets_initswfput.php:344
filtermce_external_pluginsswfput.php:761
filtertiny_mce_before_initswfput.php:763
actionmedia_buttonsswfput.php:777
actionwidgets_initswfput.php:1037
actionadmin_initswfput.php:1250
actionadmin_head-post.phpswfput.php:1252
actionadmin_head-post-new.phpswfput.php:1253
actionadmin_head-widgets.phpswfput.php:1254
actionadmin_menuswfput.php:1256
actionadmin_print_scriptsswfput.php:1258
filterwidget_textswfput.php:1294
filterthe_contentswfput.php:1298
Maintenance & Trust

SWFPut – SWFlash Put Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedAug 12, 2020
PHP min version
Downloads8K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

SWFPut – SWFlash Put Developer Profile

EdHynan

2 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SWFPut – SWFlash Put

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/swfput/js/formxed.min.js/wp-content/plugins/swfput/js/screens.min.js/wp-content/plugins/swfput/evhflv/obj.css
Version Parameters
swfput/js/screens.min.js?ver=swfput/js/formxed.min.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- html5 video/flash player -->
Data Attributes
data-swfput-vcenterdata-swfput-urldata-swfput-iddata-swfput-wdata-swfput-hdata-swfput-loop+9 more
JS Globals
window.evhplg_ctl_textpair
Shortcode Output
[putswf_video
FAQ

Frequently Asked Questions about SWFPut – SWFlash Put