
Z Security & Risk Analysis
wordpress.org/plugins/zoom-widgetThis plugin enables site users to resize the predefined areas of the web site.
Is Z Safe to Use in 2026?
Generally Safe
Score 85/100Z has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The zoom-widget plugin version 1.2.8 exhibits a mixed security posture. On the positive side, the absence of known vulnerabilities in its history, the complete lack of dangerous functions, and the exclusive use of prepared statements for SQL queries are strong indicators of good development practices concerning common web application vulnerabilities. Furthermore, there are no external HTTP requests, file operations, or cron events, significantly reducing potential attack vectors. The plugin's attack surface is minimal, with only a single shortcode identified as an entry point, and importantly, no unprotected entry points were found in the static analysis, suggesting that authentication and capability checks are likely in place for its limited interaction points.
However, a significant concern arises from the complete absence of output escaping. With 57 total outputs and 0% properly escaped, this presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data displayed by the shortcode, if not meticulously sanitized by the calling application, could be injected by an attacker, leading to session hijacking, defacement, or other malicious actions. Additionally, the use of an outdated jQuery library (v1.7.1) poses a risk, as older versions are known to contain security vulnerabilities that could be exploited if not adequately protected by other layers of defense.
In conclusion, while the plugin benefits from a clean vulnerability history and strong practices around SQL and core WordPress security features, the pervasive lack of output escaping creates a critical weakness that needs immediate attention. The outdated bundled library is a secondary concern. The absence of taint analysis results might indicate a limited scope of static analysis or that no complex data flows were identified, but the unescaped output remains a tangible and exploitable threat.
Key Concerns
- Unescaped output detected
- Bundled outdated library (jQuery v1.7.1)
Z Security Vulnerabilities
Z Code Analysis
Bundled Libraries
Output Escaping
Z Attack Surface
Shortcodes 1
WordPress Hooks 6
Maintenance & Trust
Z Maintenance & Trust
Maintenance Signals
Community Trust
Z Alternatives
No alternatives data available yet.
Z Developer Profile
9 plugins · 365K total installs
How We Detect Z
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/zoom-widget/style.css/wp-content/plugins/zoom-widget/js/zoom.js/wp-content/plugins/zoom-widget/js/zoom.jszoom-widget/style.css?ver=zoom-widget/js/zoom.js?ver=HTML / DOM Fingerprints
my="my"Spider_Zoom_shotrcodefront_end_Spider_Zoomzoom_function__oncetagclass_id_+19 more[Web-Dorado_Zoom]