Attachment Files Importer Security & Risk Analysis

wordpress.org/plugins/attachment-files-importer

Scan your Wordpress installation for all missing attachment files and download them from another Wordpress installation.

40 active installs v0.3.0 PHP + WP 3.5+ Updated Jan 31, 2014
attachmentsfilesimportimporter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Attachment Files Importer Safe to Use in 2026?

Generally Safe

Score 85/100

Attachment Files Importer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The 'attachment-files-importer' plugin v0.3.0 presents a mixed security posture. On the positive side, the static analysis reveals no critical vulnerabilities like dangerous functions, raw SQL queries, or unsanitized taint flows. The absence of known CVEs and a clean vulnerability history further indicates a generally secure codebase. However, there are notable areas for concern.

The primary weakness identified is the low percentage of properly escaped output (35%). This means a significant portion of dynamic data displayed to users could be vulnerable to cross-site scripting (XSS) attacks, especially if the plugin handles user-generated content or data from external sources. While the plugin has a limited attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that are immediately apparent as unprotected, the lack of capability checks on any entry points is a significant oversight. This implies that any authenticated user, regardless of their role or permissions, could potentially interact with the plugin's functionalities, leading to privilege escalation or unauthorized access if vulnerabilities exist within those functionalities.

In conclusion, while the plugin benefits from a lack of known serious flaws and a controlled attack surface, the insufficient output escaping and absence of capability checks are critical security gaps that require immediate attention. Addressing these areas will significantly improve the plugin's overall security.

Key Concerns

  • Insufficient output escaping
  • Missing capability checks
Vulnerabilities
None known

Attachment Files Importer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Attachment Files Importer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
8 escaped
Nonce Checks
1
Capability Checks
0
File Operations
5
External Requests
0
Bundled Libraries
0

Output Escaping

35% escaped23 total outputs
Attack Surface

Attachment Files Importer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterimport_post_meta_keyattachment-files-importer.php:89
filterhttp_request_timeoutattachment-files-importer.php:90
actionadmin_initattachment-files-importer.php:552
Maintenance & Trust

Attachment Files Importer Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedJan 31, 2014
PHP min version
Downloads8K

Community Trust

Rating20/100
Number of ratings2
Active installs40
Developer Profile

Attachment Files Importer Developer Profile

KLicheR

2 plugins · 3K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Attachment Files Importer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/attachment-files-importer/css/admin.css/wp-content/plugins/attachment-files-importer/js/admin.js
Script Paths
/wp-content/plugins/attachment-files-importer/js/admin.js
Version Parameters
attachment-files-importer/css/admin.css?ver=attachment-files-importer/js/admin.js?ver=

HTML / DOM Fingerprints

HTML Comments
Copyright 2013 Kristoffer Laurin-Racicot (email : kristoffer.lr@gmail.com)
JS Globals
ATTACHMENT_FILES_IMPORT_DEBUG
FAQ

Frequently Asked Questions about Attachment Files Importer