Text Scroller Security & Risk Analysis

wordpress.org/plugins/text-scroller

Set Scrolling Message for website

10 active installs v1.0 PHP + WP 3.2+ Updated Feb 25, 2014
text-marqueetext-scroller
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Text Scroller Safe to Use in 2026?

Generally Safe

Score 85/100

Text Scroller has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The 'text-scroller' v1.0 plugin presents a mixed security posture. On the positive side, it demonstrates strong adherence to secure coding practices concerning database interactions, with all SQL queries using prepared statements and no observed file operations or external HTTP requests. The absence of known vulnerabilities in its history is also a positive indicator. However, significant concerns arise from the static analysis of its code. The plugin exhibits a complete lack of output escaping for all three identified output flows. This means that any data displayed to users could potentially be manipulated, leading to cross-site scripting (XSS) vulnerabilities. Additionally, the absence of nonce and capability checks means that authenticated users, or even unauthenticated users in some contexts, could potentially trigger the shortcode's functionality in unintended ways. While the attack surface is small and there are no explicitly unprotected entry points that are not also protected by some form of check (though the *effectiveness* of these checks is questionable), the lack of output escaping is a critical flaw that needs immediate attention. The plugin's history of no vulnerabilities is encouraging but does not mitigate the current findings. The primary risk lies in potential XSS attacks due to unescaped output and potential privilege escalation or unwanted actions due to missing capability checks.

Key Concerns

  • Unescaped output detected
  • Missing capability checks on shortcode
  • Missing nonce checks on shortcode
Vulnerabilities
None known

Text Scroller Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Text Scroller Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
text_scroller_action (text-scroller.php:26)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Text Scroller Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[show_textscroller] text-scroller.php:67
WordPress Hooks 1
actionadmin_menutext-scroller.php:20
Maintenance & Trust

Text Scroller Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedFeb 25, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Text Scroller Developer Profile

nitinmaurya12

5 plugins · 110 total installs

83
trust score
Avg Security Score
84/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Text Scroller

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrapicon32metabox-holderhas-right-sidebarpost-bodypost-body-contentform-wrap
Data Attributes
name="post_form"enctype="multipart/form-data"name="set_msg"id="set_msg"name="submit"value="Submit"+3 more
Shortcode Output
<marquee behavior='scroll' direction='left'><div>
FAQ

Frequently Asked Questions about Text Scroller