wordpress-flowplayer Security & Risk Analysis

wordpress.org/plugins/wordpress-flowplayer

Adds a flow tag to your new post and new page section, that allows you to easily add videos to your posts.

10 active installs v0.3 PHP + WP 2.5+ Updated Dec 6, 2008
flashflash-videoflvpostsvideo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is wordpress-flowplayer Safe to Use in 2026?

Generally Safe

Score 85/100

wordpress-flowplayer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The wordpress-flowplayer plugin v0.3 exhibits a mixed security posture. On the positive side, there are no known vulnerabilities (CVEs) recorded, and the code shows good practices such as 100% of SQL queries using prepared statements and no file operations or external HTTP requests. Furthermore, the attack surface is minimal, with zero identified AJAX handlers, REST API routes, shortcodes, or cron events that are accessible to external users.

However, there are significant concerns related to output escaping and taint analysis. A concerning 17% of the identified output points are not properly escaped, posing a risk of Cross-Site Scripting (XSS) vulnerabilities. Additionally, the taint analysis revealed one flow with an unsanitized path, which could potentially lead to path traversal vulnerabilities if not handled carefully. The absence of any nonce checks on potential entry points, while currently having no entry points, suggests a lack of defense-in-depth for future development. The presence of a bundled library (TinyMCE) also introduces a potential risk if it's outdated and has known vulnerabilities.

While the plugin's lack of known CVEs is a strong indicator of a relatively safe history, the static analysis reveals specific weaknesses that could be exploited. The limited attack surface is a significant strength, but the unescaped output and the single unsanitized path flow are areas requiring immediate attention. The plugin's strengths lie in its lack of historical vulnerabilities and secure database interaction, but its weaknesses lie in potential client-side vulnerabilities due to insufficient output escaping and a potential path-related issue.

Key Concerns

  • Unescaped output detected
  • Flow with unsanitized path detected
  • Bundled library (TinyMCE) may be outdated
  • No nonce checks implemented
Vulnerabilities
None known

wordpress-flowplayer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

wordpress-flowplayer Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

wordpress-flowplayer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
1 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

TinyMCE

Output Escaping

17% escaped6 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
wpflow_options_page (wordpress-flowplayer.php:174)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

wordpress-flowplayer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_menuwordpress-flowplayer.php:58
actionwp_headwordpress-flowplayer.php:63
filterthe_contentwordpress-flowplayer.php:71
actionadmin_footerwordpress-flowplayer.php:223
actionadmin_headwordpress-flowplayer.php:271
actioninitwordpress-flowplayer.php:289
filtermce_external_pluginswordpress-flowplayer.php:295
filtermce_buttonswordpress-flowplayer.php:296
Maintenance & Trust

wordpress-flowplayer Maintenance & Trust

Maintenance Signals

WordPress version tested2.6.5
Last updatedDec 6, 2008
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

wordpress-flowplayer Developer Profile

leef

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect wordpress-flowplayer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wordpress-flowplayer/flowplayer-3.0.0.min.js/wp-content/plugins/wordpress-flowplayer/flowplayer-3.0.0.swf
Script Paths
/wp-content/plugins/wordpress-flowplayer/flowplayer-3.0.0.min.js

HTML / DOM Fingerprints

CSS Classes
flowPlayer
HTML Comments
<!-- Begin wordpress-flowplayer --><!-- End wordpress-flowplayer -->
Data Attributes
id="postnum-%POSTID%"pluginspage="http://www.adobe.com/go/getflashplayer"
JS Globals
$f
Shortcode Output
<a class="player plain" id="postnum-%POSTID%"><embed src="%PLAYER%" allowfullscreen="true" allowscriptaccess="always" quality="high" type="application/x-shockwave-flash" pluginspage="http://www.adobe.com/go/getflashplayer" id="postnum-%POSTID%" bgcolor="#000000" name="postnum-%POSTID%" flashvars="config={&quot;clip&quot;:{&quot;url&quot;:&quot;%HREF%&quot;,&quot;autoPlay&quot;:false},&quot;playerId&quot;:&quot;postnum-%POSTID%&quot;,&quot;playlist&quot;:[{&quot;url&quot;:&quot;%HREF%&quot;,&quot;autoPlay&quot;:false}]}&quot; width="%WIDTH%px" height="%HEIGHT%px"><a/>
FAQ

Frequently Asked Questions about wordpress-flowplayer