Attachments++ Security & Risk Analysis

wordpress.org/plugins/attachments-plus-plus

Plussify your attachments! Attachments++ allows auto-embedding of most document, video and audio files. No need to download that MS Word doc to read.

10 active installs v0.6 PHP + WP 2.5+ Updated Sep 3, 2013
attachmentsaudioembedgoogle-viewervideo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Attachments++ Safe to Use in 2026?

Generally Safe

Score 85/100

Attachments++ has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the Attachments Plus Plus plugin version 0.6 exhibits a strong security posture. The code analysis reveals no dangerous functions, SQL queries are all prepared, and output is properly escaped. Crucially, there are no file operations or external HTTP requests, and all identified entry points (AJAX, REST API, shortcodes, cron events) have either zero occurrences or are secured with authentication checks. Taint analysis also shows no issues with unsanitized paths.

The absence of any recorded vulnerabilities, including critical or high severity issues, further reinforces this positive assessment. This indicates a consistent effort by the developers to maintain a secure codebase and address potential security weaknesses promptly. The plugin appears to follow best practices by minimizing its attack surface and implementing robust security measures where interaction points exist.

While the lack of any identified issues is a significant strength, it's important to acknowledge that static analysis and historical data are not foolproof. However, given the current data, Attachments Plus Plus v0.6 presents a low-risk profile. Users can generally have confidence in its security, provided no new vulnerabilities emerge in future versions.

Vulnerabilities
None known

Attachments++ Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Attachments++ Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Attachments++ Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterthe_contentattachments-plus-plus.php:58
Maintenance & Trust

Attachments++ Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedSep 3, 2013
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Attachments++ Developer Profile

Dan Rossiter

2 plugins · 9K total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Attachments++

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/attachments-plus-plus/style.css
Version Parameters
attachments-plus-plus/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
attachment
FAQ

Frequently Asked Questions about Attachments++