WIDEO视频播放器 Security & Risk Analysis

wordpress.org/plugins/wideo

WIDEO视频播放器,整合dplayer,支持mp4,flv,hls等协议视频播放

100 active installs v2.0.3 PHP 5.2.4+ WP 4.7+ Updated Jan 29, 2023
dplayer%e8%a7%86%e9%a2%91%e8%a7%86%e9%a2%91%e6%92%ad%e6%94%be%e5%99%a8%e6%92%ad%e6%94%be%e5%99%a8
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WIDEO视频播放器 Safe to Use in 2026?

Generally Safe

Score 85/100

WIDEO视频播放器 has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'wideo' v2.0.3 plugin exhibits a generally strong security posture. The code analysis reveals no dangerous functions, all SQL queries use prepared statements, and all output is properly escaped, which are excellent security practices. Furthermore, the absence of file operations and external HTTP requests minimizes potential attack vectors. The vulnerability history is also clean, with no known CVEs, indicating a stable and well-maintained plugin over time.

However, there are a few areas that warrant attention. The most significant concern is the complete lack of nonce checks and the presence of two capability checks, suggesting that authenticated actions may not be adequately protected against CSRF attacks. While the attack surface is small, consisting of only one shortcode, any unprotected entry points could be a risk. The taint analysis showing zero flows is positive, but this could also be due to the limited scope of the analysis or the plugin's simple functionality. Overall, the plugin is well-coded with good sanitization and escaping, but the lack of robust authentication checks on potential action-triggering shortcodes is a notable weakness that could be exploited if combined with other vulnerabilities or if the shortcode's functionality allows for sensitive operations.

Key Concerns

  • Missing nonce checks
  • Presence of unprotected shortcode
Vulnerabilities
None known

WIDEO视频播放器 Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WIDEO视频播放器 Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
24 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped24 total outputs
Attack Surface

WIDEO视频播放器 Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wideo] class.wideo.php:33
WordPress Hooks 8
actionadmin_menuclass.wideo.php:30
actionadmin_initclass.wideo.php:31
actionwp_enqueue_scriptsclass.wideo.php:32
filterplugin_action_linksclass.wideo.php:34
actionadmin_print_scriptsclass.wideo.php:35
actioninitclass.wideo.php:36
filtermce_external_pluginsclass.wideo.php:218
filtermce_buttonsclass.wideo.php:219
Maintenance & Trust

WIDEO视频播放器 Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedJan 29, 2023
PHP min version5.2.4
Downloads10K

Community Trust

Rating96/100
Number of ratings6
Active installs100
Developer Profile

WIDEO视频播放器 Developer Profile

upcwayne

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WIDEO视频播放器

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wideo/DPlayer/flv.min.js/wp-content/plugins/wideo/DPlayer/hls.min.js/wp-content/plugins/wideo/DPlayer/DPlayer.min.js/wp-content/plugins/wideo/js/wideo_quicktags.js
Version Parameters
WIDEO_VERSION

HTML / DOM Fingerprints

CSS Classes
wideo
JS Globals
DPlayer
Shortcode Output
<div class="wideo" style="position:relative;"><div id="wideoconst dpnew DPlayer({
FAQ

Frequently Asked Questions about WIDEO视频播放器