WOW Slider Security & Risk Analysis

wordpress.org/plugins/wowslider

WOW Slider is a Wordpress slider with stunning visual effects and tons of professionally made templates.

3K active installs v8.6 PHP + WP 3.1+ Updated Nov 28, 2017
bannergalleryimageimage-sliderimages
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WOW Slider Safe to Use in 2026?

Generally Safe

Score 85/100

WOW Slider has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "wowslider" v8.6 plugin presents a mixed security posture. On one hand, the plugin boasts a history of zero known CVEs, suggesting a relatively stable and well-maintained codebase in the past. Furthermore, the analysis indicates a limited attack surface with no direct AJAX handlers or REST API routes exposed without authentication, and a single shortcode as the only user-facing entry point.

However, the static analysis reveals significant underlying concerns. The presence of dangerous functions like `create_function` and `unserialize` is a red flag, potentially opening the door for remote code execution or object injection vulnerabilities if not handled with extreme care. The low percentage of SQL queries using prepared statements (6%) is also worrying, as it increases the risk of SQL injection. A substantial portion of output (83%) is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities. The taint analysis highlights 4 high-severity flows with unsanitized paths, indicating that user-supplied data might be processed in a way that could compromise the application's integrity or security. While no critical taint flows were identified, the high number of unsanitized paths is a strong indicator of potential vulnerabilities.

In conclusion, while the absence of known vulnerabilities is a positive sign, the code quality identified through static analysis raises substantial risks. The reliance on potentially dangerous functions, inadequate SQL query sanitization, poor output escaping, and concerning taint flows suggest that the plugin is not adhering to best security practices. The lack of historical vulnerabilities may be more a testament to luck or a lack of thorough auditing rather than inherent security. Further investigation into the specific taint flows and the contexts in which dangerous functions are used is strongly recommended.

Key Concerns

  • High severity taint flows with unsanitized paths
  • Low percentage of SQL queries using prepared statements
  • High percentage of unescaped output
  • Dangerous functions used (create_function, unserialize)
  • File operations are numerous
Vulnerabilities
None known

WOW Slider Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WOW Slider Release Timeline

v3.1
v2.7.1
Code Analysis
Analyzed Mar 16, 2026

WOW Slider Code Analysis

Dangerous Functions
7
Raw SQL Queries
15
1 prepared
Unescaped Output
34
7 escaped
Nonce Checks
5
Capability Checks
3
File Operations
22
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

create_functionadd_filter('admin_body_class', create_function('$class', 'admin.php:7
create_functionadd_filter('admin_head', create_function('', 'wowslider_tinymce_button("admin_head");'));admin.php:51
create_functionadd_filter('filesystem_method', create_function('', 'return "direct";'));api.php:144
create_function$id = array_map(create_function('$v', 'return (int)$v;'), $id);api.php:174
create_function$indexes = array_map(create_function('$v', 'return (int)$v[\'ID\'];'), $id);api.php:179
unserialize$sliders[$i]['images'] = unserialize($v['images']);api.php:248
create_functionadd_action('init', create_function('', 'wowslider.php:32

Bundled Libraries

TinyMCE

SQL Query Safety

6% prepared16 total queries

Output Escaping

17% escaped41 total outputs
Data Flows · Security
5 unsanitized

Data Flow Analysis

5 flows5 with unsanitized paths
wowslider_add_new (admin.php:140)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WOW Slider Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wowslider] wowslider.php:26
WordPress Hooks 17
actionwp_before_admin_bar_renderadmin-bar.php:15
filteradmin_body_classadmin.php:7
filtermce_external_pluginsadmin.php:49
filtermce_buttonsadmin.php:50
filteradmin_headadmin.php:51
filtermanage_wowslider_sliders_columnsadmin.php:73
actioninitadmin.php:268
actioninitadmin.php:269
actionadmin_menuadmin.php:270
actionwpmu_new_blogadmin.php:271
actionadmin_enqueue_scriptsadmin.php:272
filtercontextual_helpadmin.php:273
filterin_admin_headeradmin.php:274
filterload-toplevel_page_wowslider/adminadmin.php:275
filterupgrader_source_selectionadmin.php:276
filterfilesystem_methodapi.php:144
actioninitwowslider.php:32
Maintenance & Trust

WOW Slider Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedNov 28, 2017
PHP min version
Downloads649K

Community Trust

Rating60/100
Number of ratings96
Active installs3K
Developer Profile

WOW Slider Developer Profile

WOWSlider.com

1 plugin · 3K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WOW Slider

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wowslider/data/wowslider.js
Script Paths
/wp-content/plugins/wowslider/data/wowslider.js

HTML / DOM Fingerprints

CSS Classes
ws_wrapperws_imagesws_thumbsws_bullets
HTML Comments
<![CDATA[//<![CDATA[//]]>
Data Attributes
data-wowslider
JS Globals
wowslider_wowslider
Shortcode Output
<div class="wowslider">
FAQ

Frequently Asked Questions about WOW Slider