
VidLive Security & Risk Analysis
wordpress.org/plugins/vidliveEasily add your VidLive widgets in WordPress. VidLive is the easiest way to automatically stream “Currently Live" Facebook or YouTube video from …
Is VidLive Safe to Use in 2026?
Generally Safe
Score 85/100VidLive has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The vidlive v1.1 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices in several areas: no known vulnerabilities (CVEs) have been recorded, all SQL queries utilize prepared statements, and file operations are absent. The presence of an external HTTP request is noted but without further context on its purpose, its risk is uncertain. However, there are significant concerns arising from the code analysis. The plugin lacks any nonce checks and capability checks, meaning critical functionalities may be exposed to unauthorized users. Furthermore, while the majority of output is properly escaped, a notable percentage is not, creating potential for cross-site scripting (XSS) vulnerabilities. The taint analysis revealed flows with unsanitized paths, which is a serious concern as it indicates potential for attackers to manipulate data that is processed without proper sanitization, though no critical or high severity issues were found directly in these flows.
Given the absence of recorded vulnerabilities, the plugin has a history of good security. This, combined with the correct use of prepared statements and lack of file operations, suggests some developer awareness of security. However, the lack of nonce and capability checks, coupled with unsanitized paths and partial output escaping, presents a considerable risk. The attack surface, though small, is entirely unprotected in terms of authorization and authentication, making any functionality accessible via the shortcode a potential target for privilege escalation or unauthorized actions. The conclusion is that while vidlive v1.1 benefits from a clean vulnerability history and robust SQL practices, its implementation of security checks for sensitive operations is severely lacking, creating exploitable weaknesses.
Key Concerns
- No nonce checks found
- No capability checks found
- Unsanitized paths in taint flows
- Insufficient output escaping (23%)
- Unprotected shortcode entry point
VidLive Security Vulnerabilities
VidLive Code Analysis
Output Escaping
Data Flow Analysis
VidLive Attack Surface
Shortcodes 1
WordPress Hooks 3
Maintenance & Trust
VidLive Maintenance & Trust
Maintenance Signals
Community Trust
VidLive Alternatives
Video Gallery by Huzzaz
huzzaz-video-gallery
Create a beautiful video gallery with YouTube, Vimeo, Facebook, and Twitch videos. It looks great on mobile, tablet, or desktop screens and it support …
Feed Them Social – Social Media Feeds, Video, and Photo Galleries
feed-them-social
Custom social media feeds for Instagram, Facebook, TikTok, & YouTube. Works with Elementor, Beaver Builder, and Gutenberg blocks.
Social Slider Feed
instagram-slider-widget
Display Instagram, Facebook and YouTube feeds in widgets, posts, pages, or anywhere else on your website.
Wonder Video Embed
wonderplugin-video-embed
Embed MP4, Youtube, Vimeo, Wistia videos to the sidebar widget, WordPress posts and pages.
Iframely – WP media embeds, cards and blocks
iframely
Iframely cloud extends WordPress embeds with customizable embed blocks for over 1900 rich media publishers. For the rest of the Internet, Iframely sho …
VidLive Developer Profile
1 plugin · 90 total installs
How We Detect VidLive
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
vidlive-panelclose-btndata-colname="Name"data-colname="Shortcode"window.addEventListener('message'[vidlive id="<input type="text" value="[vidlive id="