Blue Storage Security & Risk Analysis

wordpress.org/plugins/blue-storage

Blue Storage for Microsoft Azure allows you to use Azure Storage to host files for your WordPress powered blog.

10 active installs v1.2.0 PHP + WP 2.8.0+ Updated Apr 2, 2016
azureazure-storagemedia-filesmicrosoftmicrosoft-azure
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Blue Storage Safe to Use in 2026?

Generally Safe

Score 85/100

Blue Storage has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "blue-storage" plugin v1.2.0 presents a mixed security posture. While it has a seemingly small attack surface with no publicly known vulnerabilities, the static analysis reveals several concerning code signals. The presence of dangerous functions like `unserialize` and `assert`, coupled with a significant number of unsanitized path taint flows (7 out of 7 analyzed), indicates potential for serious security issues if these are not handled with extreme care and robust input validation. Furthermore, only 36% of output is properly escaped, suggesting a risk of cross-site scripting (XSS) vulnerabilities.

The lack of any recorded vulnerabilities in its history is a positive sign, suggesting the developers may have addressed issues in the past or that the plugin hasn't been extensively targeted. However, this cannot fully mitigate the risks identified in the static analysis. The plugin's strengths lie in its limited attack surface and the relatively high percentage of SQL queries using prepared statements. The weaknesses are primarily in the handling of potentially dangerous functions, untrusted input, and output escaping, which could lead to severe security vulnerabilities despite the absence of historical CVEs.

Key Concerns

  • Unsanitized paths in taint analysis (high severity)
  • Unsanitized paths in taint analysis (high severity)
  • Use of dangerous function 'unserialize'
  • Use of dangerous function 'assert'
  • Low percentage of properly escaped output
  • No nonce checks on entry points (AJAX, REST, etc.)
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
  • Low percentage of properly escaped output
Vulnerabilities
None known

Blue Storage Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Blue Storage Code Analysis

Dangerous Functions
6
Raw SQL Queries
1
6 prepared
Unescaped Output
55
31 escaped
Nonce Checks
0
Capability Checks
2
File Operations
37
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$data = unserialize($serialized);library\dependencies\HTTP\Request2\CookieJar.php:391
assertassert(Utilities::endsWith($context->getPath(), '/'));library\WindowsAzure\ServiceManagement\ServiceManagementRestProxy.php:1229
assertassert(Utilities::endsWith($context->getPath(), '/'));library\WindowsAzure\ServiceManagement\ServiceManagementRestProxy.php:1280
assertassert(Utilities::endsWith($context->getPath(), '/'));library\WindowsAzure\ServiceManagement\ServiceManagementRestProxy.php:1367
assertassert(Utilities::endsWith($context->getPath(), '/'));library\WindowsAzure\ServiceManagement\ServiceManagementRestProxy.php:1417
assertassert(Utilities::endsWith($context->getPath(), '/'));library\WindowsAzure\ServiceManagement\ServiceManagementRestProxy.php:1529

SQL Query Safety

86% prepared7 total queries

Output Escaping

36% escaped86 total outputs
Data Flows
7 unsanitized

Data Flow Analysis

7 flows7 with unsanitized paths
windows_azure_storage_dialog_browse_tab (blue-storage-dialog.php:78)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Blue Storage Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 22
filtermedia_upload_tabsblue-storage-dialog.php:84
filtermedia_upload_tabsblue-storage-dialog.php:334
filtermedia_upload_tabsblue-storage-dialog.php:446
actionadmin_menublue-storage.php:71
actionadmin_enqueue_scriptsblue-storage.php:94
filtermedia_upload_tabsblue-storage.php:100
actionmedia_upload_browseblue-storage.php:105
actionmedia_upload_searchblue-storage.php:106
actionmedia_upload_uploadblue-storage.php:107
filterwp_update_attachment_metadatablue-storage.php:112
filtercontent_save_preblue-storage.php:120
filterwp_handle_upload_prefilterblue-storage.php:123
filterwp_handle_uploadblue-storage.php:126
filterxmlrpc_methodsblue-storage.php:130
filterwp_get_attachment_urlblue-storage.php:134
filterwp_get_attachment_metadatablue-storage.php:142
actiondelete_attachmentblue-storage.php:150
filterwp_calculate_image_srcsetblue-storage.php:622
actionadmin_print_scriptsblue-storage.php:633
actionadmin_print_scriptsblue-storage.php:647
actionadmin_print_scriptsblue-storage.php:661
actionadmin_initblue-storage.php:684
Maintenance & Trust

Blue Storage Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedApr 2, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Blue Storage Developer Profile

derekheld

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Blue Storage

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/blue-storage/css/blue-storage.css
Version Parameters
blue-storage/css/blue-storage.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Blue Storage