Better image sizes Security & Risk Analysis

wordpress.org/plugins/better-image-sizes

Dynamically generate only needed image sizes for only needed images, with manually selected focal point for crops

2K active installs v3.9 PHP 5.6+ WP 3.0.1+ Updated Dec 1, 2025
mediaoptimizeresponsiveretinathumbnails
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Better image sizes Safe to Use in 2026?

Generally Safe

Score 100/100

Better image sizes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The 'better-image-sizes' v3.9 plugin exhibits a generally strong security posture, indicated by a complete absence of recorded CVEs and no critical or high-severity taint flows. The code analysis reveals good practices such as 100% of SQL queries using prepared statements and a high percentage (87%) of properly escaped output. The presence of nonce and capability checks further suggests an awareness of security principles. However, a significant concern is the use of the `unserialize` function. While not directly flagged as a taint flow in this analysis, `unserialize` is inherently risky as it can lead to Remote Code Execution (RCE) if the serialized data comes from an untrusted source and contains malicious payloads. This function, coupled with file operations, represents a potential weak point that warrants careful attention.

Key Concerns

  • Use of unserialize function
Vulnerabilities
None known

Better image sizes Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Better image sizes Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
8
53 escaped
Nonce Checks
5
Capability Checks
8
File Operations
3
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$this->detection_data = unserialize( $dataset );resizer\face-detector.php:15

Output Escaping

87% escaped61 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
options_page (resizer\index.php:103)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Better image sizes Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
actionplugins_loadedbetter-image-sizes.php:27
filterattachment_fields_to_editfocal-point\index.php:8
actionedit_attachmentfocal-point\index.php:9
actionadmin_enqueue_scriptsfocal-point\index.php:10
actionadmin_menuresizer\index.php:15
filtermedia_row_actionsresizer\index.php:16
filterattachment_fields_to_editresizer\index.php:17
actiondelete_attachmentresizer\index.php:18
actionswitch_blogresizer\index.php:19
filterintermediate_image_sizes_advancedresizer\index.php:20
filterbis_get_attachment_image_attributesresizer\index.php:21
filterbig_image_size_thresholdresizer\index.php:24
Maintenance & Trust

Better image sizes Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 1, 2025
PHP min version5.6
Downloads22K

Community Trust

Rating100/100
Number of ratings5
Active installs2K
Developer Profile

Better image sizes Developer Profile

kubiq

13 plugins · 136K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
468 days
View full developer profile
Detection Fingerprints

How We Detect Better image sizes

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/better-image-sizes/focal-point/style.css/wp-content/plugins/better-image-sizes/focal-point/script.js
Script Paths
wp-content/plugins/better-image-sizes/focal-point/script.js
Version Parameters
better-image-sizes/focal-point/style.css?ver=better-image-sizes/focal-point/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
focal-point-inputfocal-point-valuesfocal-point-topfocal-point-leftpick-focal-pointsave-focal-pointfocal-point-areafocal-point-handle+1 more
Data Attributes
data-value
FAQ

Frequently Asked Questions about Better image sizes