Author Image(s) Security & Risk Analysis

wordpress.org/plugins/author-images

Display image (if present) and/or name for the author of a post, or for all authors on the blog.

60 active installs v3.6 PHP + WP 3.1+ Updated Jan 4, 2012
authorauthorsavatarimagewidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Author Image(s) Safe to Use in 2026?

Generally Safe

Score 85/100

Author Image(s) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The author-images plugin v3.6 exhibits a mixed security posture. On the positive side, the static analysis reveals a very small attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events. This significantly limits the potential entry points for attackers. Furthermore, there is no recorded vulnerability history, which is a strong indicator of past security diligence. The absence of external HTTP requests and file operations also contributes to a more secure baseline.

However, there are several significant concerns within the code analysis. The presence of dangerous functions like `create_function` and `unserialize` poses a high risk. `create_function` can lead to arbitrary code execution if user-supplied data is used in its construction, and `unserialize` is notoriously vulnerable to object injection attacks if the serialized data is not from a trusted source. The complete lack of nonce checks and the single capability check are also major weaknesses, suggesting that many operations may not be adequately protected against unauthorized access or privilege escalation. The high percentage of improperly escaped output (67%) is a critical concern, indicating a strong likelihood of cross-site scripting (XSS) vulnerabilities.

Despite the clean vulnerability history, the identified code signals point to inherent risks. The lack of prepared statements for SQL queries also increases the risk of SQL injection. The absence of taint analysis results might be due to the analysis tool's limitations or the plugin's structure, but the presence of the dangerous functions and unescaped output strongly suggests that such flows could exist. Overall, while the limited attack surface is a strength, the significant code-level risks necessitate immediate attention and remediation.

Key Concerns

  • Dangerous functions (create_function, unserialize)
  • SQL queries without prepared statements
  • High percentage of unescaped output
  • No nonce checks
  • Limited capability checks
Vulnerabilities
None known

Author Image(s) Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Author Image(s) Release Timeline

v3.6Current
v3.5.2
v3.5.1
v3.5
v3.0
v2.0
Code Analysis
Analyzed Mar 16, 2026

Author Image(s) Code Analysis

Dangerous Functions
2
Raw SQL Queries
2
0 prepared
Unescaped Output
34
17 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'widgets_init', create_function('', 'register_widget(\'c2c_AuthorImagesWidget\');') );author-images.widget.php:96
unserialize$plugins = unserialize( $r['body']['plugins'] );c2c-plugin.php:247

SQL Query Safety

0% prepared2 total queries

Output Escaping

33% escaped51 total outputs
Attack Surface

Author Image(s) Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
filterc2c_get_author_imageauthor-images.php:466
filterc2c_get_the_author_imageauthor-images.php:485
actionc2c_the_author_imageauthor-images.php:503
actionc2c_wp_list_authors_imagesauthor-images.php:667
actionwidgets_initauthor-images.widget.php:96
actioninitc2c-plugin.php:111
actionadmin_initc2c-plugin.php:115
actionadmin_headc2c-plugin.php:117
filterplugin_row_metac2c-plugin.php:165
filterhttp_request_argsc2c-plugin.php:168
actionadmin_menuc2c-plugin.php:171
filtercontextual_helpc2c-plugin.php:174
filterwhitelist_optionsc2c-plugin.php:262
Maintenance & Trust

Author Image(s) Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedJan 4, 2012
PHP min version
Downloads22K

Community Trust

Rating0/100
Number of ratings0
Active installs60
Developer Profile

Author Image(s) Developer Profile

Scott Reilly

63 plugins · 92K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
374 days
View full developer profile
Detection Fingerprints

How We Detect Author Image(s)

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/author-images/css/author-images.css/wp-content/plugins/author-images/js/author-images.js
Script Paths
/wp-content/plugins/author-images/js/author-images.js
Version Parameters
author-images/css/author-images.css?ver=author-images/js/author-images.js?ver=

HTML / DOM Fingerprints

CSS Classes
author-image-wrapauthor-image-frameauthor-image
HTML Comments
<!-- Author Image(s) --><!-- Start Author Image(s) --><!-- End Author Image(s) --><!-- author image: by Scott Reilly -->
Data Attributes
data-author-image-urldata-author-image-alt
JS Globals
author_images
Shortcode Output
<div class="author-image-wrap"><div class="author-image-frame"><img src="
FAQ

Frequently Asked Questions about Author Image(s)