ViewMedica 9 Security & Risk Analysis

wordpress.org/plugins/viewmedica

ViewMedica 9 for WordPress Instantly embed your ViewMedica On-Demand in to your website

200 active installs v1.4.21 PHP 5.2.4+ WP 3.0.0+ Updated Feb 24, 2025
medicalvideosviewmedica
90
A · Safe
CVEs total3
Unpatched0
Last CVEJan 14, 2025
Safety Verdict

Is ViewMedica 9 Safe to Use in 2026?

Generally Safe

Score 90/100

ViewMedica 9 has a strong security track record. Known vulnerabilities have been patched promptly.

3 known CVEsLast CVE: Jan 14, 2025Updated 1yr ago
Risk Assessment

The viewmedica plugin v1.4.21 presents a mixed security posture. On the positive side, the static analysis reveals good practices in several areas. All SQL queries are properly prepared, indicating a reduced risk of SQL injection. There are no identified dangerous functions or file operations, which are common vectors for attacks. Furthermore, the plugin demonstrates a commitment to input validation with a reasonable number of nonce and capability checks. The absence of critical or high-severity taint analysis findings is also a reassuring sign. However, concerns arise from the output escaping. With only 25% of outputs properly escaped, there is a significant risk of Cross-Site Scripting (XSS) vulnerabilities. This lack of robust output sanitization could allow attackers to inject malicious scripts through various plugin functionalities. The plugin's vulnerability history, despite having no currently unpatched CVEs, shows a past pattern of 3 medium-severity vulnerabilities, primarily related to XSS and CSRF. This suggests that while the developers have addressed past issues, the underlying code may still have weaknesses that can lead to similar vulnerabilities. The presence of external HTTP requests without further context also warrants caution, as compromised external resources could potentially impact the plugin's security. Overall, the plugin exhibits strengths in data handling and authentication mechanisms but requires immediate attention to its output escaping practices to mitigate significant XSS risks.

Key Concerns

  • Low output escaping percentage (25%)
  • Previous medium severity vulnerabilities (3)
  • External HTTP requests without context
Vulnerabilities
3

ViewMedica 9 Security Vulnerabilities

CVEs by Year

3 CVEs in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
3

3 total CVEs

CVE-2024-13394medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

ViewMedica 9 <= 1.4.18 - Authenticated (Contributor+) Stored Cross-Site Scripting

Jan 14, 2025 Patched in 1.4.19 (295d)
CVE-2024-12170medium · 5.4Cross-Site Request Forgery (CSRF)

ViewMedica Embed <= 1.4.15 - Cross-Site Request Forgery to SQL Injection

Jan 6, 2025 Patched in 1.4.18 (303d)
CVE-2024-12291medium · 6.1Cross-Site Request Forgery (CSRF)

ViewMedica 9 <= 1.4.17 - Cross-Site Request Forgery to Reflected Cross-Site Scripting

Jan 6, 2025 Patched in 1.4.18 (303d)
Code Analysis
Analyzed Mar 16, 2026

ViewMedica 9 Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
12 prepared
Unescaped Output
9
3 escaped
Nonce Checks
3
Capability Checks
2
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared12 total queries

Output Escaping

25% escaped12 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<swarm-admin> (swarm-admin.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

ViewMedica 9 Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[viewmedica] swarm.php:295
WordPress Hooks 11
filtertiny_mce_before_initswarm.php:216
filtermce_external_pluginsswarm.php:217
filtermce_buttonsswarm.php:218
actionadmin_noticesswarm.php:287
actionadmin_initswarm.php:288
filtertiny_mce_versionswarm.php:291
actioninitswarm.php:292
actionwp_enqueue_scriptsswarm.php:298
actionadmin_menuswarm.php:301
actionplugins_loadedswarm.php:302
actionadmin_enqueue_scriptsswarm.php:309
Maintenance & Trust

ViewMedica 9 Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedFeb 24, 2025
PHP min version5.2.4
Downloads12K

Community Trust

Rating0/100
Number of ratings0
Active installs200
Developer Profile

ViewMedica 9 Developer Profile

Swarm Interactive

1 plugin · 200 total installs

72
trust score
Avg Security Score
90/100
Avg Patch Time
300 days
View full developer profile
Detection Fingerprints

How We Detect ViewMedica 9

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/viewmedica/vm_event_listener.js
Script Paths
https://ondemand.viewmedica.com/lib/vm.js
Version Parameters
viewmedica/vm_event_listener.js?ver=viewmedica/vm_event_listener.js?ver=1.1.0

HTML / DOM Fingerprints

HTML Comments
<!-- ViewMedica Embed End -->
JS Globals
vm_open
Shortcode Output
<div id='vm'></div><div id=''></div>
FAQ

Frequently Asked Questions about ViewMedica 9