Noembedder Security & Risk Analysis

wordpress.org/plugins/wp-noembedder

Adds noembed tags to any embeded object that doesn't have them

30 active installs v1.1 PHP + WP 2.0+ Updated May 21, 2007
gamevideosmultimedianoembedvideoyoutube
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Noembedder Safe to Use in 2026?

Generally Safe

Score 85/100

Noembedder has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 19yr ago
Risk Assessment

The wp-noembedder v1.1 plugin exhibits a generally positive security posture based on the static analysis provided, with no identified dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), or file operations. The absence of external HTTP requests and taint analysis findings also suggests a clean codebase in these critical areas. Furthermore, the plugin has no recorded vulnerabilities or CVEs, indicating a history of secure development or a lack of targeted exploitation. However, a significant concern arises from the complete lack of output escaping. With four identified outputs and none being properly escaped, this presents a substantial risk for Cross-Site Scripting (XSS) vulnerabilities. Any data rendered by the plugin without proper sanitization could be manipulated by an attacker to inject malicious scripts, leading to session hijacking or other harmful actions. The lack of capability checks and nonce checks, while not directly a risk in themselves due to the limited attack surface identified (zero unprotected entry points), signifies a missed opportunity for robust access control if the attack surface were to expand in future versions. Overall, while the plugin is free of common, severe vulnerabilities and has a clean history, the unescaped output is a critical weakness that needs immediate attention.

Key Concerns

  • Output escaping missing
Vulnerabilities
None known

Noembedder Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Noembedder Release Timeline

v1.1Current
v1.0
Code Analysis
Analyzed Apr 16, 2026

Noembedder Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

Noembedder Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuplugin-base.php:12
filterthe_contentwp-noembedder.php:29
Maintenance & Trust

Noembedder Maintenance & Trust

Maintenance Signals

WordPress version tested2.2
Last updatedMay 21, 2007
PHP min version
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

Noembedder Developer Profile

dalziel

6 plugins · 80 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Noembedder

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrapoptionseditform
Data Attributes
name="wp_votd_update"name="info_update"name="cmd"name="business"name="item_name"name="no_note"+3 more
Shortcode Output
<noembed><p><em>There is embedded content here that you cannot see. Please <a href=""><img src="" alt="" /></a><br /><em>There is embedded content here that you cannot see. Please <a href="">open the post in a web browser</a> to see this.</em></p></noembed>
FAQ

Frequently Asked Questions about Noembedder