WP Preloader Security & Risk Analysis

wordpress.org/plugins/wp-preloader

WP Preloader is a simple and customizable wordpress preloader plugin. Very easy to use.

10 active installs v1.0 PHP + WP 3.5+ Updated Sep 11, 2016
jqueryloading-screen-overlaypreloaderwordpress-preloader
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Preloader Safe to Use in 2026?

Generally Safe

Score 85/100

WP Preloader has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The wp-preloader plugin version 1.0 exhibits a generally strong security posture based on the provided static analysis. It effectively avoids dangerous functions, utilizes prepared statements for all SQL queries, and has no recorded vulnerability history, indicating a mature and well-maintained codebase. The absence of file operations, external HTTP requests, and critical taint flows further strengthens its security profile.

However, a significant concern arises from the complete lack of output escaping. With 3 outputs analyzed and 0% properly escaped, this presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Attackers could potentially inject malicious scripts through the plugin's output, which could then be executed in the context of a user's browser.

Additionally, the absence of nonce and capability checks, while not directly linked to specific entry points in this analysis, is a general security weakness. While the attack surface is currently small and appears protected, future additions or modifications to the code might inadvertently introduce vulnerabilities if these fundamental security checks are not implemented. Overall, the plugin has good foundational security but requires immediate attention to address the unescaped output.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP Preloader Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Preloader Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

WP Preloader Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[new_loader] wp-preloader.php:75
WordPress Hooks 5
actionadmin_menuadmin\wp-preloader-admin.php:10
actionadmin_initadmin\wp-preloader-admin.php:12
actionadmin_enqueue_scriptsadmin\wp-preloader-admin.php:14
actionwp_enqueue_scriptswp-preloader.php:38
actionwp_enqueue_scriptswp-preloader.php:40
Maintenance & Trust

WP Preloader Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedSep 11, 2016
PHP min version
Downloads5K

Community Trust

Rating80/100
Number of ratings4
Active installs10
Developer Profile

WP Preloader Developer Profile

mamunitiw

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Preloader

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-preloader/css/style.css/wp-content/plugins/wp-preloader/js/script.js/wp-content/plugins/wp-preloader/js/admin-script.js
Script Paths
/wp-content/plugins/wp-preloader/js/script.js/wp-content/plugins/wp-preloader/js/admin-script.js
Version Parameters
wp-preloader/js/script.js?ver=wp-preloader/css/style.css?ver=

HTML / DOM Fingerprints

Shortcode Output
[new_loader]
FAQ

Frequently Asked Questions about WP Preloader