
Author Image(s) Security & Risk Analysis
wordpress.org/plugins/author-imagesDisplay image (if present) and/or name for the author of a post, or for all authors on the blog.
Is Author Image(s) Safe to Use in 2026?
Generally Safe
Score 85/100Author Image(s) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The author-images plugin v3.6 exhibits a mixed security posture. On the positive side, the static analysis reveals a very small attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events. This significantly limits the potential entry points for attackers. Furthermore, there is no recorded vulnerability history, which is a strong indicator of past security diligence. The absence of external HTTP requests and file operations also contributes to a more secure baseline.
However, there are several significant concerns within the code analysis. The presence of dangerous functions like `create_function` and `unserialize` poses a high risk. `create_function` can lead to arbitrary code execution if user-supplied data is used in its construction, and `unserialize` is notoriously vulnerable to object injection attacks if the serialized data is not from a trusted source. The complete lack of nonce checks and the single capability check are also major weaknesses, suggesting that many operations may not be adequately protected against unauthorized access or privilege escalation. The high percentage of improperly escaped output (67%) is a critical concern, indicating a strong likelihood of cross-site scripting (XSS) vulnerabilities.
Despite the clean vulnerability history, the identified code signals point to inherent risks. The lack of prepared statements for SQL queries also increases the risk of SQL injection. The absence of taint analysis results might be due to the analysis tool's limitations or the plugin's structure, but the presence of the dangerous functions and unescaped output strongly suggests that such flows could exist. Overall, while the limited attack surface is a strength, the significant code-level risks necessitate immediate attention and remediation.
Key Concerns
- Dangerous functions (create_function, unserialize)
- SQL queries without prepared statements
- High percentage of unescaped output
- No nonce checks
- Limited capability checks
Author Image(s) Security Vulnerabilities
Author Image(s) Release Timeline
Author Image(s) Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Author Image(s) Attack Surface
WordPress Hooks 13
Maintenance & Trust
Author Image(s) Maintenance & Trust
Maintenance Signals
Community Trust
Author Image(s) Alternatives
Top Authors
top-authors
A highly customizable widget that allows you to display the top authors of your website easily.
Meks Smart Author Widget
meks-smart-author-widget
Easily display your author/user profile info inside WordPress widget.
Author Avatars List/Block
author-avatars
Display lists of user avatars using widgets or shortcodes. With Gutenberg support.
User Avatar – Reloaded
user-avatar-reloaded
Use any image from your WordPress Media Library as a custom user avatar or user profile picture. Add your own Default Avatar.
BNS Corner Logo
bns-corner-logo
Widget to display a logo; or, used as a plugin displays image fixed in one of the four corners.
Author Image(s) Developer Profile
63 plugins · 92K total installs
How We Detect Author Image(s)
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/author-images/css/author-images.css/wp-content/plugins/author-images/js/author-images.js/wp-content/plugins/author-images/js/author-images.jsauthor-images/css/author-images.css?ver=author-images/js/author-images.js?ver=HTML / DOM Fingerprints
author-image-wrapauthor-image-frameauthor-image<!-- Author Image(s) --><!-- Start Author Image(s) --><!-- End Author Image(s) --><!-- author image: by Scott Reilly -->data-author-image-urldata-author-image-altauthor_images<div class="author-image-wrap"><div class="author-image-frame"><img src="