WP-Parsi JW Player Security & Risk Analysis

wordpress.org/plugins/wp-parsi-jwplayer

Create player with JW Player shortcode on-the-fly!

60 active installs v1.2 PHP + WP 4.4.0+ Updated Feb 19, 2019
jwjw-playerplayersimplevideo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-Parsi JW Player Safe to Use in 2026?

Generally Safe

Score 85/100

WP-Parsi JW Player has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The wp-parsi-jwplayer v1.2 plugin exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, SQL queries without prepared statements, and file operations are positive indicators. Crucially, all identified outputs are properly escaped, and there are no external HTTP requests or taint flows indicating potential vulnerabilities. The plugin also shows no recorded history of CVEs, suggesting a track record of secure development or a lack of exploitation attempts.

However, the analysis does highlight some areas for improvement. The presence of a shortcode as an entry point, while not inherently insecure, warrants careful consideration, especially if it handles user-supplied data. The complete lack of nonce and capability checks across all entry points is a significant concern. While the static analysis found no obvious vulnerabilities, this absence of authorization and validation mechanisms means that if any unforeseen vulnerabilities are introduced in the future, they could be easily exploited without requiring authentication or specific user privileges.

In conclusion, wp-parsi-jwplayer v1.2 benefits from a clean codebase regarding common vulnerability types like SQL injection and XSS. Its vulnerability history further reinforces this. Nevertheless, the lack of any authorization or nonce checks on its sole entry point (the shortcode) presents a significant potential risk. Future development should prioritize implementing appropriate checks to ensure that only authorized users can interact with the plugin's features and that all input is validated.

Key Concerns

  • Missing nonce checks on entry points
  • Missing capability checks on entry points
Vulnerabilities
None known

WP-Parsi JW Player Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-Parsi JW Player Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

WP-Parsi JW Player Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wppjwp] jwplayer.php:45
Maintenance & Trust

WP-Parsi JW Player Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedFeb 19, 2019
PHP min version
Downloads14K

Community Trust

Rating100/100
Number of ratings4
Active installs60
Developer Profile

WP-Parsi JW Player Developer Profile

Morteza Geransayeh

6 plugins · 100K total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
183 days
View full developer profile
Detection Fingerprints

How We Detect WP-Parsi JW Player

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-parsi-jwplayer/player.swf

HTML / DOM Fingerprints

CSS Classes
mediaplayer
Data Attributes
flashvarsallowfullscreenallowscriptaccessnamesrc
Shortcode Output
<div id='mediaplayer'>JW Player 5</div><embed flashvars='file= src=/player.swf'
FAQ

Frequently Asked Questions about WP-Parsi JW Player