
yt_EachUser Security & Risk Analysis
wordpress.org/plugins/yt-eachuserThe list of videos is displayed specifying the user of Youtube.
Is yt_EachUser Safe to Use in 2026?
Generally Safe
Score 85/100yt_EachUser has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "yt-eachuser" v1.2.5 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by avoiding dangerous functions, utilizing prepared statements for all SQL queries, and having no known vulnerabilities or CVEs. The static analysis also shows a limited attack surface with no direct AJAX or REST API entry points that lack authentication checks. However, there are significant concerns regarding output escaping and the presence of unsanitized paths in taint analysis.
The plugin's output escaping is a notable weakness, with only 36% of outputs being properly escaped. This could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled securely before being displayed. Furthermore, the taint analysis reveals two flows with unsanitized paths, indicating potential vulnerabilities where data might be processed without adequate sanitization, although no critical or high severity issues were flagged in this analysis.
The absence of any recorded vulnerabilities in its history is a strong positive indicator. This suggests a developer who is either diligent about security or has not yet attracted attention from attackers. Nevertheless, the identified weaknesses in output escaping and unsanitized paths are real risks that should be addressed to strengthen the plugin's overall security. A balanced conclusion is that while the plugin has a clean vulnerability history and good SQL practices, the identified output escaping and taint flow issues require immediate attention.
Key Concerns
- Low percentage of properly escaped output
- Taint flows with unsanitized paths (2 flows)
- No nonce checks
- No capability checks
yt_EachUser Security Vulnerabilities
yt_EachUser Code Analysis
Output Escaping
Data Flow Analysis
yt_EachUser Attack Surface
Shortcodes 1
WordPress Hooks 1
Maintenance & Trust
yt_EachUser Maintenance & Trust
Maintenance Signals
Community Trust
yt_EachUser Alternatives
Video Gallery – YouTube Playlist, Channel Gallery by YotuWP
yotuwp-easy-youtube-embed
Modern responsive YouTube video gallery helps your website getting noticed from visitors, increase the reach and stand out from the competitors.
My YouTube Channel
youtube-channel
Show video thumbnails or playable video block of recent YouTube Playlist, Channel (User Uploads) videos.
SocialFeeds
socialfeeds
YouTube feeds for WordPress with simple Setup and Settings options.
Meks Video Importer
meks-video-importer
Easily import YouTube and Vimeo videos in bulk to your posts, pages or any custom post type.
Playlist Player for YouTube
youtube-playlist-player
Display a YouTube player (with an optional playlist) on any post or page using a simple shortcode.
yt_EachUser Developer Profile
2 plugins · 40 total installs
How We Detect yt_EachUser
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
<ul><li><a href="http://www.youtube.com/watch?v=([^"]*)"><img src="([^"]*)" alt="([^"]*)" width="([^"]*)" height="([^"]*)" style="width:([^"]*);height:([^"]*);"/></a><p><a href="http://www.youtube.com/watch?v=([^"]*)">([^<]*)</a></p></li></ul>