WordCycle Security & Risk Analysis

wordpress.org/plugins/wordcycle

WordCycle is a WordPress plugin that acts as a wrapper for the popular jQuery Cycle Plugin by Mike Alsup.

10 active installs v1.1 PHP + WP 2.5+ Updated Oct 28, 2010
galleryimagesjavascriptjqueryslideshow
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WordCycle Safe to Use in 2026?

Generally Safe

Score 85/100

WordCycle has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "wordcycle" plugin v1.1 exhibits a generally strong security posture based on the static analysis. The absence of AJAX handlers, REST API routes, cron events, and file operations significantly limits its attack surface. Crucially, all SQL queries are prepared, and there are no identified dangerous functions or external HTTP requests, which are excellent indicators of secure coding practices in these areas. The lack of any recorded vulnerabilities or CVEs in its history further suggests a mature and stable codebase.

However, a notable concern is the output escaping. With 40% of outputs properly escaped, there's a 60% chance that some outputs might be unescaped, potentially leading to Cross-Site Scripting (XSS) vulnerabilities if user-controlled data is displayed without proper sanitization. Additionally, the complete absence of nonce checks and capability checks across all entry points is a significant weakness. While the current attack surface is minimal (one shortcode), any future expansion or modification of these entry points without implementing proper authorization and nonce validation will introduce critical security risks. The lack of taint analysis data is also a gap; while it indicates no *found* issues, it doesn't guarantee the absence of such vulnerabilities.

In conclusion, "wordcycle" v1.1 is off to a good start with its minimal attack surface and secure handling of core functionalities like SQL. The primary areas for immediate improvement are ensuring all outputs are properly escaped and implementing robust nonce and capability checks for all entry points, especially the shortcode. The plugin's clean vulnerability history is a positive sign, but vigilance in the identified areas is crucial for maintaining this record.

Key Concerns

  • Unescaped output (60% of outputs)
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

WordCycle Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WordCycle Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

40% escaped5 total outputs
Attack Surface

WordCycle Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[slideshow] wordcycle.php:176
WordPress Hooks 4
actionwp_headwordcycle.php:28
actionwp_footerwordcycle.php:29
actionwp_headwordcycle.php:172
actionwp_footerwordcycle.php:173
Maintenance & Trust

WordCycle Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedOct 28, 2010
PHP min version
Downloads5K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

WordCycle Developer Profile

eswhite

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WordCycle

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WordCycle