Attachments Security & Risk Analysis

wordpress.org/plugins/attachments

Attachments allows you to simply append any number of items from your WordPress Media Library to Posts, Pages, and Custom Post Types

9K active installs v3.5.11 PHP + WP 3.0+ Updated Dec 30, 2025
attachmentpagepdfpicturepost
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Attachments Safe to Use in 2026?

Generally Safe

Score 100/100

Attachments has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The "attachments" plugin v3.5.11 demonstrates a strong security posture overall, with no recorded vulnerabilities or CVEs. The static analysis reveals a minimal attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected by authentication or permission checks. The plugin also utilizes prepared statements for all its SQL queries and avoids file operations and external HTTP requests, further reducing potential risks. However, the presence of two instances of the `unserialize` function warrants attention, as it can be a vector for deserialization vulnerabilities if not handled with extreme care and input validation. While taint analysis found no unsanitized paths or critical/high severity flows, the `unserialize` function itself is a known risk factor. The plugin also has a good proportion of properly escaped outputs, though a quarter of them are not, which could lead to XSS vulnerabilities in specific scenarios. The consistent lack of past vulnerabilities and the presence of nonce and capability checks indicate a development team that prioritizes security. Nevertheless, the `unserialize` usage is a notable area of concern that slightly diminishes an otherwise very good security score.

Key Concerns

  • Dangerous function 'unserialize' used
  • Output escaping is not 100%
Vulnerabilities
None known

Attachments Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Attachments Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
45
147 escaped
Nonce Checks
8
Capability Checks
5
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$data = unserialize( base64_decode( $attachment ) );classes\class.attachments.migrate.php:83
unserialize$data = unserialize( base64_decode( $attachment ) );deprecated\get-attachments.php:74

Output Escaping

77% escaped192 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
init_migration (classes\class.attachments.migrate.php:223)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Attachments Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 26
actionadmin_enqueue_scriptsclasses\class.attachments.legacy.php:27
actionadmin_noticesclasses\class.attachments.legacy.php:30
actionadmin_print_footer_scriptsclasses\class.attachments.legacy.php:154
actionplugins_loadedclasses\class.attachments.php:83
actionplugins_loadedclasses\class.attachments.php:86
actionadmin_enqueue_scriptsclasses\class.attachments.php:89
actioninitclasses\class.attachments.php:92
actioninitclasses\class.attachments.php:95
actionadd_meta_boxesclasses\class.attachments.php:97
actionadmin_footerclasses\class.attachments.php:98
actionsave_postclasses\class.attachments.php:99
actionadmin_menuclasses\class.attachments.php:102
actionadmin_headclasses\class.attachments.php:104
actionadmin_print_footer_scriptsclasses\class.attachments.php:105
actionadmin_initclasses\class.attachments.php:107
actionafter_setup_themeclasses\class.attachments.php:111
actiondelete_postclasses\class.attachments.php:160
filterwp_default_editorclasses\fields\class.field.wysiwyg.php:21
actioninitdeprecated\attachments.php:70
actionadmin_enqueue_scriptsdeprecated\attachments.php:73
actionadmin_headdeprecated\attachments.php:74
actionadmin_menudeprecated\attachments.php:77
actionplugins_loadeddeprecated\attachments.php:80
actionadmin_initdeprecated\attachments.php:83
actionsave_postdeprecated\attachments.php:86
actionadd_meta_boxesdeprecated\attachments.php:89
Maintenance & Trust

Attachments Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 30, 2025
PHP min version
Downloads281K

Community Trust

Rating96/100
Number of ratings53
Active installs9K
Developer Profile

Attachments Developer Profile

Jon Christopher

11 plugins · 110K total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Attachments

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Attachments