WP Video Enhanced Security & Risk Analysis

wordpress.org/plugins/wp-video-enhanced

Extending Native WordPress Player with New Features. Logo & Branding, GDPR Consent, HLS, M(PEG)-DASH, Live Streaming, Configure Initial Volume and …

40 active installs v1.3.0 PHP 5.3.0+ WP 4.9.6+ Updated Aug 21, 2018
gdprhlslivelogowatermark
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Video Enhanced Safe to Use in 2026?

Generally Safe

Score 85/100

WP Video Enhanced has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The wp-video-enhanced plugin v1.3.0 exhibits several concerning security practices despite having no recorded historical vulnerabilities. The primary areas of risk stem from its "attack surface" analysis, which reveals two AJAX handlers with no authentication checks. This means any unauthenticated user could potentially interact with these handlers, leading to an open door for malicious activity if the functionality they trigger is sensitive.

The "code signals" section further amplifies these concerns. The presence of dangerous functions like `create_function` and `unserialize` are significant red flags. `create_function` is deprecated and can lead to code injection if not handled with extreme care, while `unserialize` is notoriously prone to object injection vulnerabilities when processing untrusted input. The low percentage of properly escaped output (55%) indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the site.

While the plugin demonstrates good practices in using prepared statements for SQL queries and has no external HTTP requests, these strengths are overshadowed by the critical weaknesses in authentication, input sanitization, and output escaping. The lack of any recorded CVEs in its history might suggest either infrequent targeting or a fortunate lack of exploitation. However, given the identified code flaws, this plugin should be treated with caution and ideally updated or replaced with a more secure alternative.

Key Concerns

  • Unprotected AJAX handlers
  • Use of dangerous function: unserialize
  • Use of dangerous function: create_function
  • Low percentage of properly escaped output
  • Missing nonce checks on AJAX
  • Missing capability checks
Vulnerabilities
None known

WP Video Enhanced Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP Video Enhanced Release Timeline

v1.3.0Current
v1.2.0
v1.1.0
v1.0.0
Code Analysis
Analyzed Mar 16, 2026

WP Video Enhanced Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
14
17 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_function$callback = create_function( '', 'echo "' . str_replace( '"', '\"', $section['description'] ) . '";'admin\class-wpve-admin.php:324
unserialize$vimeo = unserialize( file_get_contents( "https://vimeo.com/api/v2/video/$id.php" ) );includes\functions.php:132

Output Escaping

55% escaped31 total outputs
Attack Surface
2 unprotected

WP Video Enhanced Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_wpve_set_cookieincludes\class-wpve.php:140
noprivwp_ajax_wpve_set_cookieincludes\class-wpve.php:141
WordPress Hooks 14
actionplugins_loadedincludes\class-wpve.php:102
actionwp_loadedincludes\class-wpve.php:117
actionadmin_enqueue_scriptsincludes\class-wpve.php:118
actionadmin_enqueue_scriptsincludes\class-wpve.php:119
actionadmin_menuincludes\class-wpve.php:120
actionadmin_initincludes\class-wpve.php:121
actionwp_enqueue_scriptsincludes\class-wpve.php:138
actionwp_enqueue_scriptsincludes\class-wpve.php:139
filtermejs_settingsincludes\class-wpve.php:143
filterwp_video_extensionsincludes\class-wpve.php:144
filtermime_typesincludes\class-wpve.php:145
filtershortcode_atts_videoincludes\class-wpve.php:146
filterwp_video_shortcodeincludes\class-wpve.php:147
filterembed_oembed_htmlincludes\class-wpve.php:148
Maintenance & Trust

WP Video Enhanced Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedAug 21, 2018
PHP min version5.3.0
Downloads5K

Community Trust

Rating84/100
Number of ratings5
Active installs40
Developer Profile

WP Video Enhanced Developer Profile

Plugins360 Labs

3 plugins · 29K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
123 days
View full developer profile
Detection Fingerprints

How We Detect WP Video Enhanced

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-video-enhanced/admin/assets/js/wpve-admin.js/wp-content/plugins/wp-video-enhanced/assets/css/wpve-public.css/wp-content/plugins/wp-video-enhanced/assets/js/wpve-public.js
Script Paths
wp-color-pickerwp-video-enhanced/admin/assets/js/wpve-admin.jswpve-public.js
Version Parameters
wp-video-enhanced/admin/assets/js/wpve-admin.js?ver=wp-video-enhanced/assets/css/wpve-public.css?ver=wp-video-enhanced/assets/js/wpve-public.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpve-video-wrapper
Data Attributes
data-wpve-video
JS Globals
wpve_vars
Shortcode Output
[video[wp_video_enhanced
FAQ

Frequently Asked Questions about WP Video Enhanced