
WP-Parsi JW Player Security & Risk Analysis
wordpress.org/plugins/wp-parsi-jwplayerCreate player with JW Player shortcode on-the-fly!
Is WP-Parsi JW Player Safe to Use in 2026?
Generally Safe
Score 85/100WP-Parsi JW Player has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The wp-parsi-jwplayer v1.2 plugin exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, SQL queries without prepared statements, and file operations are positive indicators. Crucially, all identified outputs are properly escaped, and there are no external HTTP requests or taint flows indicating potential vulnerabilities. The plugin also shows no recorded history of CVEs, suggesting a track record of secure development or a lack of exploitation attempts.
However, the analysis does highlight some areas for improvement. The presence of a shortcode as an entry point, while not inherently insecure, warrants careful consideration, especially if it handles user-supplied data. The complete lack of nonce and capability checks across all entry points is a significant concern. While the static analysis found no obvious vulnerabilities, this absence of authorization and validation mechanisms means that if any unforeseen vulnerabilities are introduced in the future, they could be easily exploited without requiring authentication or specific user privileges.
In conclusion, wp-parsi-jwplayer v1.2 benefits from a clean codebase regarding common vulnerability types like SQL injection and XSS. Its vulnerability history further reinforces this. Nevertheless, the lack of any authorization or nonce checks on its sole entry point (the shortcode) presents a significant potential risk. Future development should prioritize implementing appropriate checks to ensure that only authorized users can interact with the plugin's features and that all input is validated.
Key Concerns
- Missing nonce checks on entry points
- Missing capability checks on entry points
WP-Parsi JW Player Security Vulnerabilities
WP-Parsi JW Player Code Analysis
WP-Parsi JW Player Attack Surface
Shortcodes 1
Maintenance & Trust
WP-Parsi JW Player Maintenance & Trust
Maintenance Signals
Community Trust
WP-Parsi JW Player Alternatives
JW Player for WordPress
jw-player-7-for-wp
JW Player for WordPress enables you to publish videos on your WordPress posts and pages using the most popular video player on the web.
JW Player Snapshot Tool
jw-player-snapshot-tool
JW Player Snapshot Tool is a small JW Player module to create video snapshot
Related Videos for JW Player
related-videos-for-jw-player
It creates the feed required from "Related Videos" add-on for JW Player, one for each Wordpress category.
Remote My Project Playlist Plugin for WordPress
remote-my-project-playlist-plugin-for-wordpress
This plugin is provided by Hollywood Tools LLC. It enables you to configure and embed a Remote My Project Playlist for use on your WordPress website.
Gr80 JWPlayer Plugin Helper Panel
gr80-jwplayer-plugin-helper-panel
JWPlayer Panel registers a meta box in your Post Writing Panel, where you enter your video title/url/thumbnail, and get those displayed automatically …
WP-Parsi JW Player Developer Profile
6 plugins · 100K total installs
How We Detect WP-Parsi JW Player
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-parsi-jwplayer/player.swfHTML / DOM Fingerprints
mediaplayerflashvarsallowfullscreenallowscriptaccessnamesrc<div id='mediaplayer'>JW Player 5</div><embed flashvars='file= src=/player.swf'