Brozzme Plugins Thumbnails Security & Risk Analysis

wordpress.org/plugins/brozzme-add-plugins-thumbnails

Add thumbnail column to plugins list table in the admin plugins page even they are not in the repository.

70 active installs v1.4.5 PHP 5.6+ WP 4.7+ Updated Oct 28, 2021
addadminiconlist-tablethumbnails
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Brozzme Plugins Thumbnails Safe to Use in 2026?

Generally Safe

Score 85/100

Brozzme Plugins Thumbnails has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The plugin 'brozzme-add-plugins-thumbnails' v1.4.5 exhibits a mixed security posture. On the positive side, it has a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are accessible to attackers. Furthermore, its SQL queries are all properly prepared, and it has no file operations or bundled libraries that could introduce vulnerabilities. The absence of known CVEs and a history of vulnerabilities is also a strong indicator of diligent development or a lack of targeting.

However, several concerning code signals are present. The use of the `unserialize` function is a significant risk, as it can lead to Remote Code Execution if unsanitized user input is passed to it. The low percentage of properly escaped output (3%) suggests a high likelihood of Cross-Site Scripting (XSS) vulnerabilities, especially given the absence of nonces for any potential entry points that might exist but aren't explicitly listed. The single capability check and lack of nonce checks on AJAX handlers (which are listed as zero, but the presence of the capability check suggests internal logic) point to potential privilege escalation or unauthorized actions if the `unserialize` function is ever triggered with malicious data.

While the vulnerability history is clean, the presence of `unserialize` and poor output escaping are critical internal weaknesses that outweigh the lack of external history. The plugin's strengths lie in its limited attack surface and secure SQL handling, but these are overshadowed by the significant risks posed by deserialization vulnerabilities and widespread XSS potential. Further investigation into how `unserialize` is used and ensuring all output is properly escaped is strongly recommended.

Key Concerns

  • Use of unserialize function
  • Low percentage of properly escaped output
  • No nonce checks on potential entry points
  • Only one capability check
Vulnerabilities
None known

Brozzme Plugins Thumbnails Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Brozzme Plugins Thumbnails Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
2 prepared
Unescaped Output
36
1 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
5
Bundled Libraries
0

Dangerous Functions Found

unserialize$body = unserialize($body['body']);includes\brozzme_plugins_page.php:329

SQL Query Safety

100% prepared2 total queries

Output Escaping

3% escaped37 total outputs
Attack Surface

Brozzme Plugins Thumbnails Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
actionadmin_enqueue_scriptsbrozzme_plugins_thumbnails.php:43
actionplugins_loadedbrozzme_plugins_thumbnails.php:46
actionadmin_headbrozzme_plugins_thumbnails.php:72
filtermanage_plugins_columnsbrozzme_plugins_thumbnails.php:73
actionmanage_plugins_custom_columnbrozzme_plugins_thumbnails.php:74
actionadmin_menuincludes\brozzme_plugins_page.php:21
actionadmin_footer_textincludes\brozzme_plugins_page.php:44
actionplugins_loadedincludes\brozzme_plugins_page.php:48
actionadmin_menuincludes\brozzme_plugins_thumbnails_settings.php:15
actionadmin_initincludes\brozzme_plugins_thumbnails_settings.php:16
actionadmin_enqueue_scriptsincludes\brozzme_plugins_thumbnails_settings.php:19
actionupdated_optionincludes\brozzme_plugins_thumbnails_settings.php:20
Maintenance & Trust

Brozzme Plugins Thumbnails Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedOct 28, 2021
PHP min version5.6
Downloads10K

Community Trust

Rating100/100
Number of ratings3
Active installs70
Developer Profile

Brozzme Plugins Thumbnails Developer Profile

Benoti

11 plugins · 11K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Brozzme Plugins Thumbnails

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/brozzme-add-plugins-thumbnails/css/brozzme-admin-css.css/wp-content/plugins/brozzme-add-plugins-thumbnails/css/style.css
Version Parameters
/brozzme-add-plugins-thumbnails/css/brozzme-admin-css.css?ver=/brozzme-add-plugins-thumbnails/css/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
wps-ext-imgsquare-boxsquare-contentflfls
Data Attributes
data-srcdata-pluginNamedata-pluginfldata-pluginflsdata-color
FAQ

Frequently Asked Questions about Brozzme Plugins Thumbnails