Automatic Alternative Text Security & Risk Analysis

wordpress.org/plugins/automatic-alternative-text

Automatically generate alt text for images with Microsoft's Cognitive Services Computer Vision API.

100 active installs v1.1.4 PHP + WP 4.4+ Updated Jul 1, 2019
accessibilitygalleryimageimagesmedia
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Automatic Alternative Text Safe to Use in 2026?

Generally Safe

Score 85/100

Automatic Alternative Text has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "automatic-alternative-text" plugin v1.1.4 exhibits a generally good security posture with several positive indicators. The absence of known vulnerabilities in its history, coupled with the use of prepared statements for all SQL queries and proper output escaping, suggests a commitment to secure coding practices. The plugin also avoids dangerous functions and file operations, further reducing its attack surface. However, a significant concern arises from the presence of an unprotected AJAX handler. This single unprotected entry point represents a direct risk, as it can be triggered by unauthenticated users, potentially leading to unintended actions or information disclosure depending on the handler's functionality. While taint analysis found no issues, the lack of nonce checks on the AJAX handler is a direct omission that leaves it vulnerable to Cross-Site Request Forgery (CSRF) attacks.

The plugin's vulnerability history is clean, which is a strong positive. This indicates a low likelihood of previously exploited weaknesses. The limited attack surface, with only one AJAX handler identified, is also beneficial. However, the fact that this single entry point lacks authentication is a notable weakness. The presence of an external HTTP request is not inherently a security risk, but its context would be important for a deeper analysis. Ultimately, the plugin is well-coded in many respects, but the unprotected AJAX handler is a critical oversight that needs immediate attention to mitigate potential security risks.

Key Concerns

  • Unprotected AJAX handler
  • AJAX handler missing nonce check
Vulnerabilities
None known

Automatic Alternative Text Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Automatic Alternative Text Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
7 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped7 total outputs
Attack Surface
1 unprotected

Automatic Alternative Text Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_aat_dismiss_api_noticeautomatic-alternative-text.php:106
WordPress Hooks 3
actionadmin_noticesautomatic-alternative-text.php:95
actionadmin_initautomatic-alternative-text.php:122
actionadd_attachmentautomatic-alternative-text.php:229
Maintenance & Trust

Automatic Alternative Text Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedJul 1, 2019
PHP min version
Downloads10K

Community Trust

Rating82/100
Number of ratings7
Active installs100
Developer Profile

Automatic Alternative Text Developer Profile

Jacob Peattie

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Automatic Alternative Text

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/automatic-alternative-text/js/aat-admin.js
Version Parameters
automatic-alternative-text/js/aat-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
aat-api-notice
Data Attributes
id="aat_endpoint"id="aat_api_key"id="aat_confidence"
FAQ

Frequently Asked Questions about Automatic Alternative Text