Auto Files Security & Risk Analysis

wordpress.org/plugins/auto-files

Auto Files is a minified version of Auto Attachments. This Plugin show you attached files in your the_content(). Supported file types are doc, docx, x …

50 active installs v0.8 PHP + WP 3.6+ Updated Jan 31, 2015
attachmentattachmentsrartarzip
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Auto Files Safe to Use in 2026?

Generally Safe

Score 85/100

Auto Files has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The static analysis of the "auto-files" plugin v0.8 reveals a generally strong security posture, with no critical or high-severity issues identified in taint analysis and zero known vulnerabilities. The plugin demonstrates good practices by utilizing prepared statements for all SQL queries and including nonce and capability checks.

However, a significant concern arises from the output escaping, where 100% of the four identified outputs are not properly escaped. This presents a risk of Cross-Site Scripting (XSS) vulnerabilities if the data being output is user-controlled or sourced from external inputs that are not sufficiently sanitized before being displayed. While the attack surface appears minimal with no AJAX, REST API routes, shortcodes, or cron events, the lack of output escaping on any rendered content still poses a potential threat.

In conclusion, "auto-files" v0.8 shows promise with its adherence to secure coding practices like prepared statements and authorization checks. The absence of a vulnerability history is also a positive indicator. The primary weakness lies in the complete lack of output escaping, which requires immediate attention to mitigate potential XSS risks. Addressing this output escaping issue would significantly improve the plugin's overall security.

Key Concerns

  • 0% of outputs properly escaped
Vulnerabilities
None known

Auto Files Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Auto Files Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

Auto Files Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitautofiles.php:26
filterthe_contentautofiles.php:79
actionadd_meta_boxesmetaboxes.php:11
actionsave_postmetaboxes.php:12
Maintenance & Trust

Auto Files Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedJan 31, 2015
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings1
Active installs50
Developer Profile

Auto Files Developer Profile

Serkan Algur

6 plugins · 610 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Auto Files

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/auto-files/autofiles.css

HTML / DOM Fingerprints

CSS Classes
filessectiongroupcolspan_1_of_6fileinsfl-application-pdfsfl-application-rar+20 more
Data Attributes
id="aa_post_meta"name="aa_post_meta"id="aa_post_meta"name="aa_post_meta"name="aa_meta_nonce"name="post_type"
FAQ

Frequently Asked Questions about Auto Files