ChargeWP – Front End Avatar Upload Security & Risk Analysis

wordpress.org/plugins/chargewp-front-end-avatar-upload

Change your profile picture instantly from the front end. Simple, fast, and built to feel like part of WordPress.

20 active installs v2.0.2 PHP 7.4+ WP 5.8+ Updated Dec 3, 2025
avatarfrontend-uploadgravatarprofile-picturewoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ChargeWP – Front End Avatar Upload Safe to Use in 2026?

Generally Safe

Score 100/100

ChargeWP – Front End Avatar Upload has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The "chargewp-front-end-avatar-upload" v2.0.2 plugin exhibits a mixed security posture. While the absence of known CVEs and a history of common vulnerability types are positive indicators, the static analysis reveals significant concerns regarding its attack surface. A substantial portion of its entry points, specifically three out of four AJAX handlers, lack authentication checks, presenting a direct pathway for unauthorized actions. Additionally, the plugin uses raw SQL queries without prepared statements, which can lead to SQL injection vulnerabilities if user input is not properly sanitized. The plugin does show good practices in output escaping, with a high percentage of outputs being properly escaped, and it does not appear to perform file operations or external HTTP requests, limiting other potential attack vectors. The lack of taint analysis results is also a slight concern, as it means that potential data flow vulnerabilities may not have been thoroughly investigated.

Overall, the plugin's strengths lie in its lack of historical vulnerabilities and good output escaping. However, the unprotected AJAX handlers and the use of raw SQL queries are critical weaknesses that introduce significant security risks. The current version does not have any known unpatched vulnerabilities, but the existing code structure suggests a higher likelihood of future vulnerabilities if these issues are not addressed. A balanced conclusion would be that while the plugin is not currently known to be compromised, its development practices introduce substantial risks that require immediate attention to improve its security posture.

Key Concerns

  • Unprotected AJAX handlers
  • Raw SQL queries without prepared statements
Vulnerabilities
None known

ChargeWP – Front End Avatar Upload Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

ChargeWP – Front End Avatar Upload Release Timeline

v2.0.2Current
v2.0.1
v2.0.0
v1.0.2
v1.0.1
v1.0.0
Code Analysis
Analyzed Mar 16, 2026

ChargeWP – Front End Avatar Upload Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
6
36 escaped
Nonce Checks
3
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries

Output Escaping

86% escaped42 total outputs
Attack Surface
3 unprotected

ChargeWP – Front End Avatar Upload Attack Surface

Entry Points4
Unprotected3

AJAX Handlers 3

authwp_ajax_cwpa_delete_profile_pictureadmin\profile.php:60
authwp_ajax_cwpa_upload_profile_pictureincludes\upload.php:9
noprivwp_ajax_cwpa_upload_profile_pictureincludes\upload.php:127

Shortcodes 1

[chargewp_avatar] includes\display.php:73
WordPress Hooks 8
actionuser_profile_picture_descriptionadmin\profile.php:11
actionprofile_updateadmin\profile.php:83
filterpre_get_avatar_dataincludes\display.php:145
filterblock_categories_allincludes\display.php:180
actioninitincludes\display.php:204
actionplugins_loadedincludes\display.php:226
actionwoocommerce_before_account_navigationincludes\display.php:228
actioncwpd_dashboard_sidebar_beforeincludes\display.php:235
Maintenance & Trust

ChargeWP – Front End Avatar Upload Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 3, 2025
PHP min version7.4
Downloads289

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

ChargeWP – Front End Avatar Upload Developer Profile

ChargeWP

1 plugin · 20 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ChargeWP – Front End Avatar Upload

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/chargewp-front-end-avatar-upload/assets/cwpa.min.css/wp-content/plugins/chargewp-front-end-avatar-upload/assets/smartcrop-optimized.min.js/wp-content/plugins/chargewp-front-end-avatar-upload/assets/cwpa.min.js/wp-content/plugins/chargewp-front-end-avatar-upload/assets/cwpa-admin.js
Script Paths
/wp-content/plugins/chargewp-front-end-avatar-upload/assets/cwpa.min.js/wp-content/plugins/chargewp-front-end-avatar-upload/assets/smartcrop-optimized.min.js/wp-content/plugins/chargewp-front-end-avatar-upload/assets/cwpa-admin.js
Version Parameters
chargewp-front-end-avatar-upload/assets/cwpa.min.css?ver=chargewp-front-end-avatar-upload/assets/smartcrop-optimized.min.js?ver=chargewp-front-end-avatar-upload/assets/cwpa.min.js?ver=chargewp-front-end-avatar-upload/assets/cwpa-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
cwpa-avatar-wrapper
HTML Comments
Location: includes/display.phpLocation: admin/profile.phpOptional. Array of attributes to control the output.Type of display: 0 for avatar only, 1 for avatar with name and user ID, 2 for avatar with name, user ID, and profile link. Default 0.+5 more
Data Attributes
data-userid
JS Globals
cwpa_avatar_upload_varscwpa_admin_vars
Shortcode Output
[chargewp_avatar]
FAQ

Frequently Asked Questions about ChargeWP – Front End Avatar Upload