Bulk Change Media Author Security & Risk Analysis

wordpress.org/plugins/bulk-change-media-author

Bulk change author for multiple media files, using the default WP Media Library.

2K active installs v1.3.2 PHP + WP 4.7+ Updated Aug 31, 2023
attachmentauthorbulkmediaupload
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Bulk Change Media Author Safe to Use in 2026?

Generally Safe

Score 85/100

Bulk Change Media Author has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "bulk-change-media-author" plugin v1.3.2 exhibits a mixed security posture. On the positive side, the plugin has no recorded vulnerabilities (CVEs) in its history, suggesting a generally stable and secure codebase. Furthermore, the static analysis reveals a remarkably small attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events detected. The absence of dangerous functions, file operations, and external HTTP requests also contributes positively to its security profile. The plugin also exclusively uses prepared statements for its SQL queries, which is an excellent security practice.

However, several concerns are raised by the static analysis. A significant portion of output (73%) is not properly escaped, creating a risk of Cross-Site Scripting (XSS) vulnerabilities if any user-supplied data is reflected in the output. The taint analysis indicates two flows with unsanitized paths, although these did not reach critical or high severity. This could still lead to information disclosure or path traversal if exploited, especially in conjunction with the unescaped output. The complete lack of nonce and capability checks is also a major concern, as it means any authenticated user, regardless of their role or permissions, could potentially trigger actions within the plugin. This lack of authorization checks, combined with the unescaped output, is the most significant risk identified.

Key Concerns

  • Significant amount of unescaped output
  • Taint flows with unsanitized paths
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Bulk Change Media Author Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Bulk Change Media Author Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
11
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

27% escaped15 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
bulk_change_media_author_edit_page_callback (bulk-change-media-author.php:60)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Bulk Change Media Author Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterbulk_actions-uploadbulk-change-media-author.php:20
filterhandle_bulk_actions-uploadbulk-change-media-author.php:31
actionadmin_menubulk-change-media-author.php:45
actionplugins_loadedbulk-change-media-author.php:200
Maintenance & Trust

Bulk Change Media Author Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedAug 31, 2023
PHP min version
Downloads10K

Community Trust

Rating98/100
Number of ratings8
Active installs2K
Developer Profile

Bulk Change Media Author Developer Profile

Ruslan Mikhno

1 plugin · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Bulk Change Media Author

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/bulk-change-media-author/languages/

HTML / DOM Fingerprints

CSS Classes
resultmediamedia-authormedia-thumb
Data Attributes
name="for"name="author"name="media"
JS Globals
window.location
FAQ

Frequently Asked Questions about Bulk Change Media Author