Allure Gallery Security & Risk Analysis

wordpress.org/plugins/allure-gallery

The Allure Gallery plugin provides functionality for the native WordPress gallery to have one image on top with thumbnails underneath.

10 active installs v1.2.2 PHP + WP + Updated May 7, 2022
gallery
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Allure Gallery Safe to Use in 2026?

Generally Safe

Score 85/100

Allure Gallery has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The static analysis of Allure Gallery v1.2.2 indicates a strong security posture based on the provided data. The absence of identified entry points such as AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code signals reveal no dangerous functions, all SQL queries use prepared statements, and all output is properly escaped. The lack of file operations and external HTTP requests further reinforces this positive assessment. The taint analysis also shows no identified vulnerabilities. The vulnerability history is equally reassuring, with zero known CVEs, meaning no known unpatched vulnerabilities exist for this version. This suggests a mature and secure development practice for this specific version.

While the immediate findings are excellent, the complete lack of certain security checks, such as nonce checks and capability checks, is a point of consideration. Although there are no identified entry points that would necessitate these checks in this version, a future update introducing such features without proper implementation could introduce vulnerabilities. The absence of any recorded vulnerabilities historically is a significant strength, indicating a consistent focus on security by the developers. Overall, Allure Gallery v1.2.2 exhibits a very good security profile based on this static analysis, with no immediate threats detected.

Vulnerabilities
None known

Allure Gallery Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Allure Gallery Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped3 total outputs
Attack Surface

Allure Gallery Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionplugins_loadedincludes\class-allure-gallery.php:143
actionadmin_enqueue_scriptsincludes\class-allure-gallery.php:159
actionadmin_enqueue_scriptsincludes\class-allure-gallery.php:160
actionwp_enqueue_scriptsincludes\class-allure-gallery.php:176
actionwp_enqueue_scriptsincludes\class-allure-gallery.php:177
actionwp_footerincludes\class-allure-gallery.php:179
actionprint_media_templatesincludes\class-allure-gallery.php:181
filterpost_galleryincludes\class-allure-gallery.php:183
Maintenance & Trust

Allure Gallery Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedMay 7, 2022
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Allure Gallery Developer Profile

allurewebsolutions

3 plugins · 4K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Allure Gallery

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/allure-gallery/css/allure-gallery-admin.css/wp-content/plugins/allure-gallery/js/allure-gallery-admin.js
Script Paths
/wp-content/plugins/allure-gallery/js/allure-gallery-admin.js
Version Parameters
allure-gallery-admin.css?ver=allure-gallery-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
allure-gallery-thumbnails
FAQ

Frequently Asked Questions about Allure Gallery