AutoThumb Security & Risk Analysis
wordpress.org/plugins/autothumbThe plugin is actually just a port of a plugin/snippet I wrote for MODx a while ago (see here). It scans your content's source code for <img&g …
Is AutoThumb Safe to Use in 2026?
Generally Safe
Score 85/100AutoThumb has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'autothumb' v0.6.1 plugin presents a mixed security posture. On one hand, the absence of known vulnerabilities and a clean vulnerability history are positive indicators. The static analysis reveals no direct attack vectors through AJAX, REST API, shortcodes, or cron events, and importantly, all SQL queries utilize prepared statements, which is a strong security practice. Furthermore, the majority of output is properly escaped, mitigating risks of cross-site scripting (XSS) vulnerabilities.
However, significant concerns arise from the presence of dangerous functions like `create_function` and `exec`. The `exec` function, in particular, can be a major security risk if used with user-supplied input, allowing for arbitrary command execution on the server. The taint analysis, while showing no critical or high severity flows, indicates that 100% of the analyzed flows involved unsanitized paths, which is a concerning pattern and suggests potential for vulnerabilities if these paths are ever exposed to user input or interaction.
While the plugin currently has no known CVEs, the findings from the static analysis, especially the use of `exec` and unsanitized paths, suggest a latent risk. The complete lack of nonce and capability checks on any potential entry points, although the analysis found zero such points, signifies a potential weakness if the attack surface were to expand in future versions or if an overlooked entry point exists. The plugin's strengths lie in its clean history and secure SQL usage, but the identified code signals and taint flow patterns demand caution.
Key Concerns
- Dangerous function `exec` used
- Dangerous function `create_function` used
- All analyzed taint flows have unsanitized paths
- No nonce checks found
- No capability checks found
- Some output not properly escaped (15%)
AutoThumb Security Vulnerabilities
AutoThumb Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
AutoThumb Attack Surface
WordPress Hooks 6
Maintenance & Trust
AutoThumb Maintenance & Trust
Maintenance Signals
Community Trust
AutoThumb Alternatives
Crop-Thumbnails
crop-thumbnails
"Crop Thumbnails" made it easy to get exacly that specific image-detail you want to show in your featured image or gallery image.
Webp Transformer
webp-transformer
Convert images from library to webp and resize them during upload
Delete Thumbnails
delete-thumbnails
Find and delete thumbnails & resized images from your Media Library
Thumbnail Updater
thumbnail-updater
A plugin for updating your thumbnails whenever a new thumbnail size is added with add_image_size()
ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF
shortpixel-image-optimiser
Optimize images & PDFs smartly. Create and compress next-gen WebP and AVIF formats. Smart crop and resize.
AutoThumb Developer Profile
8 plugins · 740 total installs
How We Detect AutoThumb
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/autothumb/autothumb.phpautothumb/autothumb.php?ver=