YouTube Subscriber Security & Risk Analysis

wordpress.org/plugins/youtube-subscriber

This plugin creates widget and shortcode with YouTube subscribing channel form or button.

70 active installs v2.0 PHP + WP 3.5.1+ Updated Aug 22, 2016
sharesubscribingyoutube
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is YouTube Subscriber Safe to Use in 2026?

Generally Safe

Score 85/100

YouTube Subscriber has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "youtube-subscriber" v2.0 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by not making external HTTP requests, having no file operations, and utilizing prepared statements for its SQL queries. The lack of known CVEs and a clean vulnerability history are also strong indicators of a well-maintained and secure plugin over time. However, the code analysis reveals significant areas of concern. The presence of a dangerous function, `create_function`, is a notable risk. Furthermore, a substantial percentage of output (77%) is not properly escaped, which can lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is ever processed by these outputs. The absence of nonce checks on its single shortcode entry point, despite a capability check being present, could still allow for certain types of attacks if the shortcode's functionality is sensitive. The taint analysis showing zero flows is positive, but this may be due to the limited scope of analysis or the absence of user input being directly fed into potentially dangerous operations. Overall, while the plugin's history is reassuring, the static analysis highlights potential vulnerabilities that require attention to ensure continued security.

Key Concerns

  • Dangerous function 'create_function' used
  • High percentage of unescaped output
  • Nonce check missing on shortcode entry point
Vulnerabilities
None known

YouTube Subscriber Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

YouTube Subscriber Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
34
10 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'widgets_init', create_function( '', 'register_widget( "YouTube_Subscriber" );' ) ); //Wyoutube-subscriber.php:11

Output Escaping

23% escaped44 total outputs
Attack Surface

YouTube Subscriber Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[youtube-subscriber] shortcodes.php:47
WordPress Hooks 4
filtermce_external_pluginsshortcodes.php:55
filtermce_buttonsshortcodes.php:56
actioninitshortcodes.php:60
actionwidgets_inityoutube-subscriber.php:11
Maintenance & Trust

YouTube Subscriber Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedAug 22, 2016
PHP min version
Downloads10K

Community Trust

Rating90/100
Number of ratings4
Active installs70
Developer Profile

YouTube Subscriber Developer Profile

WEB4PRO_co

3 plugins · 90 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect YouTube Subscriber

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/youtube-subscriber/js/youtube-subscriber.js
Version Parameters
youtube-subscriber/js/youtube-subscriber.js?ver=

HTML / DOM Fingerprints

CSS Classes
g-ytsubscribe
Data Attributes
data-channeldata-channeliddata-layoutdata-count
Shortcode Output
[youtube_subscriber<iframe id="fr"<div class="g-ytsubscribe"
FAQ

Frequently Asked Questions about YouTube Subscriber