Before/After Security & Risk Analysis

wordpress.org/plugins/beforeafter

A "before and after" portfolio generator. Uses images uploaded to the media library; organize galleries from the post add/edit page.

10 active installs v0.2 PHP + WP 2.5+ Updated Jan 7, 2010
before-aftercmsimage-gallerymedia-libraryportfolio
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Before/After Safe to Use in 2026?

Generally Safe

Score 85/100

Before/After has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The 'beforeafter' plugin version 0.2 exhibits a remarkably clean static analysis report, indicating strong adherence to secure coding practices. The absence of any dangerous functions, raw SQL queries, unescaped output, file operations, or external HTTP requests is highly commendable. Furthermore, the lack of any identified taint flows suggests that the plugin does not process potentially untrusted input in a way that could lead to vulnerabilities. The vulnerability history is also pristine, with no known CVEs recorded for this plugin, which is a strong indicator of its current security. However, the complete absence of any security checks like nonce or capability checks, combined with zero identified entry points (AJAX, REST API, shortcodes, cron), raises a flag. While this might mean there are no exposed functionalities to secure, it also means that if any entry points were introduced later or missed in the analysis, they would be entirely unprotected. This lack of any authentication or authorization mechanisms, while seemingly secure due to no entry points, represents a potential weakness if the plugin's scope expands or if the static analysis did not capture all potential interaction vectors.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Before/After Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Before/After Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Before/After Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Before/After Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedJan 7, 2010
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Before/After Developer Profile

keighl

3 plugins · 100 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Before/After

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/beforeafter/css/beforeafter.css/wp-content/plugins/beforeafter/js/beforeafter.js
Script Paths
/wp-content/plugins/beforeafter/js/beforeafter.js
Version Parameters
beforeafter/css/beforeafter.css?ver=beforeafter/js/beforeafter.js?ver=

HTML / DOM Fingerprints

CSS Classes
ba_boxba_clearba_useba_columnba_mediaba_alertba_list_item
Data Attributes
id="ba_media"id="ba_before"id="ba_after"class="ba_list_item"
JS Globals
ba_return_everythingba_return_media_libraryba_return_beforeafterba_addba_removeba_sort
REST Endpoints
/wp-admin/admin-ajax.php
FAQ

Frequently Asked Questions about Before/After