yt_EachUser Security & Risk Analysis

wordpress.org/plugins/yt-eachuser

The list of videos is displayed specifying the user of Youtube.

10 active installs v1.2.5 PHP + WP 3.1+ Updated Jul 11, 2017
listtagvideoyoutube
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is yt_EachUser Safe to Use in 2026?

Generally Safe

Score 85/100

yt_EachUser has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "yt-eachuser" v1.2.5 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by avoiding dangerous functions, utilizing prepared statements for all SQL queries, and having no known vulnerabilities or CVEs. The static analysis also shows a limited attack surface with no direct AJAX or REST API entry points that lack authentication checks. However, there are significant concerns regarding output escaping and the presence of unsanitized paths in taint analysis.

The plugin's output escaping is a notable weakness, with only 36% of outputs being properly escaped. This could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled securely before being displayed. Furthermore, the taint analysis reveals two flows with unsanitized paths, indicating potential vulnerabilities where data might be processed without adequate sanitization, although no critical or high severity issues were flagged in this analysis.

The absence of any recorded vulnerabilities in its history is a strong positive indicator. This suggests a developer who is either diligent about security or has not yet attracted attention from attackers. Nevertheless, the identified weaknesses in output escaping and unsanitized paths are real risks that should be addressed to strengthen the plugin's overall security. A balanced conclusion is that while the plugin has a clean vulnerability history and good SQL practices, the identified output escaping and taint flow issues require immediate attention.

Key Concerns

  • Low percentage of properly escaped output
  • Taint flows with unsanitized paths (2 flows)
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

yt_EachUser Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

yt_EachUser Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

36% escaped22 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
gwwpp_yt_each_user_admin_page (tplt\admin_page.php:2)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

yt_EachUser Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[print_yt_EachUser] yt-eachuser.php:61
WordPress Hooks 1
actionadmin_menuyt-eachuser.php:274
Maintenance & Trust

yt_EachUser Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedJul 11, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

yt_EachUser Developer Profile

shin1kt

2 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect yt_EachUser

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<ul><li><a href="http://www.youtube.com/watch?v=([^"]*)"><img src="([^"]*)" alt="([^"]*)" width="([^"]*)" height="([^"]*)" style="width:([^"]*);height:([^"]*);"/></a><p><a href="http://www.youtube.com/watch?v=([^"]*)">([^<]*)</a></p></li></ul>
FAQ

Frequently Asked Questions about yt_EachUser