Video Dashboard Security & Risk Analysis

wordpress.org/plugins/video-dashboard

Easily embed YouTube videos in your admin dashboard area with Video Dashboard.

500 active installs v1.2.1.1 PHP + WP 3.0.1+ Updated Mar 11, 2026
admindashboardvideovimeoyoutube
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Video Dashboard Safe to Use in 2026?

Generally Safe

Score 100/100

Video Dashboard has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 23d ago
Risk Assessment

The "video-dashboard" plugin version 1.2.1.1 exhibits a seemingly strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface. Furthermore, the code signals indicate no dangerous functions, no raw SQL queries, no file operations, no external HTTP requests, and crucially, no vulnerabilities identified in the vulnerability history. This suggests a developer who is mindful of secure coding practices.

However, a significant concern arises from the output escaping analysis, which shows that 0% of the 7 total outputs are properly escaped. This represents a clear risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data could be rendered directly in the browser without sanitization. Despite the absence of identified taint flows, this lack of output escaping is a critical oversight that could be exploited if any input were to reach these output points. The complete absence of nonce and capability checks, while not directly flagged as a risk due to the zero attack surface, indicates a potential blind spot that could become exploitable if new entry points are introduced in future versions.

In conclusion, while the plugin benefits from a very small attack surface and a clean vulnerability history, the complete lack of output escaping is a major weakness. This critical oversight creates a high likelihood of XSS vulnerabilities. The developer has demonstrated good practice in avoiding dangerous functions and raw SQL, but must address output sanitization to improve the overall security.

Key Concerns

  • Output escaping not implemented
Vulnerabilities
None known

Video Dashboard Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Video Dashboard Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped7 total outputs
Attack Surface

Video Dashboard Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuincludes\admin-page.php:81
actionadmin_initincludes\admin-page.php:89
actionwp_dashboard_setupvideo-dashboard.php:26
actionadmin_enqueue_scriptsvideo-dashboard.php:47
Maintenance & Trust

Video Dashboard Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 11, 2026
PHP min version
Downloads8K

Community Trust

Rating100/100
Number of ratings6
Active installs500
Developer Profile

Video Dashboard Developer Profile

brianjohnsondesign

1 plugin · 500 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Video Dashboard

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/video-dashboard/includes/video-dashboard.css

HTML / DOM Fingerprints

CSS Classes
video-container
FAQ

Frequently Asked Questions about Video Dashboard