Wonder Video Embed Security & Risk Analysis

wordpress.org/plugins/wonderplugin-video-embed

Embed MP4, Youtube, Vimeo, Wistia videos to the sidebar widget, WordPress posts and pages.

5K active installs v2.4 PHP + WP 3.6+ Updated Feb 20, 2025
video-embedvideo-lightboxvideo-playervideo-widgetyoutube-embed
91
A · Safe
CVEs total2
Unpatched0
Last CVEFeb 18, 2025
Safety Verdict

Is Wonder Video Embed Safe to Use in 2026?

Generally Safe

Score 91/100

Wonder Video Embed has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Feb 18, 2025Updated 1yr ago
Risk Assessment

The wonderplugin-video-embed v2.4 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by using prepared statements for all SQL queries, performing nonce and capability checks on its entry points, and having no observed external HTTP requests or file operations. The limited attack surface, with only one shortcode and no unprotected AJAX handlers or REST API routes, further contributes to its security. However, the presence of the `unserialize` function as a dangerous function signal is a significant concern, as it can lead to Remote Code Execution if not handled with extreme caution and robust input validation.

The static analysis also reveals that a notable percentage of output is not properly escaped, which poses a risk of Cross-Site Scripting (XSS) vulnerabilities. While the taint analysis shows no flows with unsanitized paths and no critical or high severity issues, the unescaped output is a precursor to such problems. The vulnerability history indicates a pattern of medium-severity XSS vulnerabilities in the past, with the last one being relatively recent. Although there are currently no unpatched CVEs, this history suggests a recurring weakness in input sanitization or output encoding within the plugin.

In conclusion, while the plugin has a controlled attack surface and employs some fundamental security measures like prepared statements and permission checks, the identified dangerous function (`unserialize`) and the high percentage of unescaped output, coupled with a history of XSS vulnerabilities, present notable risks. The developers should prioritize addressing these areas to improve the plugin's overall security and prevent future exploits.

Key Concerns

  • Dangerous function unserialize detected
  • 43% of outputs not properly escaped
  • History of medium severity XSS vulnerabilities
Vulnerabilities
2

Wonder Video Embed Security Vulnerabilities

CVEs by Year

1 CVE in 2021
2021
1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2024-13743medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Wonder Video Embed <= 2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

Feb 18, 2025 Patched in 2.3 (1d)
CVE-2021-24540medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Wonder Video Embed <= 1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting

Jul 19, 2021 Patched in 1.8 (918d)
Code Analysis
Analyzed Mar 16, 2026

Wonder Video Embed Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
50
37 escaped
Nonce Checks
3
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserializereturn unserialize($info);app\class-wonderplugin-videoembed-model.php:64

Output Escaping

43% escaped87 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
print_register (app\class-wonderplugin-videoembed-view.php:407)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Wonder Video Embed Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wonderplugin_video] wonderpluginvideoembed.php:41
WordPress Hooks 8
actionadmin_menuwonderpluginvideoembed.php:39
actioninitwonderpluginvideoembed.php:43
actionwp_enqueue_scriptswonderpluginvideoembed.php:44
actionadmin_enqueue_scriptswonderpluginvideoembed.php:45
actionadmin_initwonderpluginvideoembed.php:49
actionwidgets_initwonderpluginvideoembed.php:52
filtermce_external_pluginswonderpluginvideoembed.php:110
filtermce_buttonswonderpluginvideoembed.php:111
Maintenance & Trust

Wonder Video Embed Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedFeb 20, 2025
PHP min version
Downloads101K

Community Trust

Rating100/100
Number of ratings5
Active installs5K
Developer Profile

Wonder Video Embed Developer Profile

WonderPlugin

6 plugins · 26K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
368 days
View full developer profile
Detection Fingerprints

How We Detect Wonder Video Embed

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wonderplugin-video-embed/app/wonderplugin-videoembed-creator.js/wp-content/plugins/wonderplugin-video-embed/app/wonderplugin-videoembed-creator.css/wp-content/plugins/wonderplugin-video-embed/engine/wonderpluginvideoembed.js/wp-content/plugins/wonderplugin-video-embed/wonderpluginvideoembed.css
Script Paths
/wp-content/plugins/wonderplugin-video-embed/app/wonderplugin-videoembed-mce.js
Version Parameters
wonderplugin-video-embed/engine/wonderpluginvideoembed.js?ver=wonderplugin-video-embed/app/wonderplugin-videoembed-creator.js?ver=

HTML / DOM Fingerprints

CSS Classes
wonderplugin-video-embedwpve-video-embed-wrapwpve-main-wrap
Data Attributes
data-wonderplugin-video-embeddata-options
JS Globals
WONDERPLUGIN_VIDEO_MCE_EDITOR
Shortcode Output
[wonderplugin_video
FAQ

Frequently Asked Questions about Wonder Video Embed