binaryImagemagick Security & Risk Analysis

wordpress.org/plugins/binaryimagemagick

Use an Imagemagick-binary for image-manipulation

70 active installs v1.0.1 PHP + WP 4.1.0+ Updated Feb 5, 2015
imagemagickimagickopen_basedir
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is binaryImagemagick Safe to Use in 2026?

Generally Safe

Score 85/100

binaryImagemagick has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The binaryimagemagick plugin version 1.0.1 exhibits a strong security posture concerning external attack vectors and data handling. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its potential attack surface. Furthermore, the plugin demonstrates excellent practices with 100% of its SQL queries utilizing prepared statements and 100% of its outputs being properly escaped, indicating robust defense against common vulnerabilities like SQL injection and cross-site scripting. The lack of file operations and external HTTP requests further minimizes potential exposure.

However, the presence of dangerous functions like `exec` and `passthru` is a significant concern. While the static analysis did not reveal immediate exploitability due to the limited attack surface, these functions, if ever exposed to user input without proper sanitization and strict access controls, could lead to severe remote code execution vulnerabilities. The absence of nonce and capability checks on any potential entry points (though none were identified) is also a point of caution, as it suggests a reliance on the limited attack surface for security rather than explicit checks.

The plugin's vulnerability history is clean, with no recorded CVEs. This, combined with the clean taint analysis, suggests that in its current state and version, it has not been found to be vulnerable. However, the inherent risks associated with the `exec` and `passthru` functions remain a latent threat that could be realized if the plugin's functionality evolves or if previously undiscovered vulnerabilities are introduced. The overall assessment is that while the plugin is currently secure due to its limited scope and good data handling, the use of dangerous functions warrants careful monitoring and a proactive approach to ensure these functions are never misused.

Key Concerns

  • Use of dangerous functions (exec, passthru)
  • No nonce checks on potential entry points
  • No capability checks on potential entry points
Vulnerabilities
None known

binaryImagemagick Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

binaryImagemagick Code Analysis

Dangerous Functions
6
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

execexec('which convert', $content, $result);Org_Heigl\BinaryImagemagick.php:123
execexec('export PATH=/usr/bin:/usr/local/bin; which convert', $content, $result);Org_Heigl\BinaryImagemagick.php:130
execexec(self::$convert . ' -list format | grep -i ' . $imagick_extension, $result);Org_Heigl\BinaryImagemagick.php:152
execexec(self::$convert . ' -identify "' . $this->file . '" null', $result);Org_Heigl\BinaryImagemagick.php:425
execexec(self::$convert . ' ' . $this->file . ' ' . $this->getOptionString() . ' ' . $filename, $result)Org_Heigl\BinaryImagemagick.php:451
passthrupassthru(self::$convert . ' "' . $this->file . '" ' . $this->getOptionString() . ' ' . $extension .Org_Heigl\BinaryImagemagick.php:477
Attack Surface

binaryImagemagick Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterwp_image_editorsbinaryImagemagick.php:41
Maintenance & Trust

binaryImagemagick Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.0
Last updatedFeb 5, 2015
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs70
Developer Profile

binaryImagemagick Developer Profile

heiglandreas

3 plugins · 5K total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
204 days
View full developer profile
Detection Fingerprints

How We Detect binaryImagemagick

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about binaryImagemagick