Visual Composer Galleria Security & Risk Analysis

wordpress.org/plugins/vc-galleria

It's a simple and elegant visual composer extension slider that works awesome on mobile.

60 active installs v1.1.1 PHP + WP 3.0.1+ Updated Jul 2, 2017
galleryimagemobileresponsiveslider
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Visual Composer Galleria Safe to Use in 2026?

Generally Safe

Score 85/100

Visual Composer Galleria has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The plugin "vc-galleria" v1.1.1 exhibits a mixed security posture. On the positive side, the static analysis reveals no dangerous functions, no direct SQL queries (all are prepared), no file operations, and no external HTTP requests. The absence of known CVEs and any recorded vulnerability history is also a strong indicator of a well-maintained or less complex plugin.

However, significant concerns arise from the lack of output escaping. With 100% of outputs not properly escaped, this presents a high risk of Cross-Site Scripting (XSS) vulnerabilities. If any user-supplied data or dynamically generated content is outputted without sanitization, an attacker could inject malicious scripts. Furthermore, the complete absence of nonce and capability checks on the identified entry point (shortcode) is a critical oversight, potentially allowing unauthorized actions or information disclosure if the shortcode's functionality is sensitive or can be manipulated.

In conclusion, while the plugin avoids common pitfalls like raw SQL and external requests, the unescaped output and the lack of robust authorization checks on its shortcode represent substantial security weaknesses that need immediate attention. The clean vulnerability history is a positive sign, but it doesn't negate the risks identified in the current analysis.

Key Concerns

  • Outputs not properly escaped
  • Shortcode without nonce/capability checks
Vulnerabilities
None known

Visual Composer Galleria Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Visual Composer Galleria Release Timeline

v1.1.1Current
v1.1
v1.0.1
v1.0
Code Analysis
Analyzed Mar 16, 2026

Visual Composer Galleria Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Visual Composer Galleria Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wp-galleria] vc_extend.php:25
WordPress Hooks 3
actioninitvc_extend.php:23
actionwp_enqueue_scriptsvc_extend.php:27
actionadmin_noticesvc_extend.php:33
Maintenance & Trust

Visual Composer Galleria Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedJul 2, 2017
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs60
Developer Profile

Visual Composer Galleria Developer Profile

mainericiangel

2 plugins · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Visual Composer Galleria

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/vc-galleria/assets/lightslider.css/wp-content/plugins/vc-galleria/assets/lightslider.js
Script Paths
/wp-content/plugins/vc-galleria/assets/lightslider.js

HTML / DOM Fingerprints

CSS Classes
lSSlideWrapperlsGrablsGrabPag
Data Attributes
data-thumb
JS Globals
lightSlider
Shortcode Output
<ul id=""><li data-thumb=""></li></ul><script> jQuery(function () { jQuery("#
FAQ

Frequently Asked Questions about Visual Composer Galleria