Cloudimage Security & Risk Analysis

wordpress.org/plugins/cloudimage

The easiest way to resize, compress, optimise and deliver lightning fast images to your users on any device via CDN.

300 active installs v4.0.6 PHP 5.6+ WP 4.8+ Updated Jan 23, 2026
cdnconvert-webpimage-resizingoptimize-imagesseo
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Cloudimage Safe to Use in 2026?

Generally Safe

Score 100/100

Cloudimage has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The cloudimage plugin v4.0.6 exhibits a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for SQL queries, avoiding dangerous functions, and not performing file operations. The plugin also has a clean vulnerability history, with no known CVEs, suggesting a generally stable and well-maintained codebase. However, significant security concerns are present due to the static analysis results. The presence of an unprotected AJAX handler represents a critical entry point that could be exploited without proper authentication or authorization checks, increasing the risk of unauthorized actions. While the taint analysis found no critical or high-severity flows, the presence of two flows with unsanitized paths is a red flag that warrants further investigation, as it could indicate potential for unintended data handling. The low percentage of properly escaped output further heightens the risk of cross-site scripting (XSS) vulnerabilities. Despite a clean history, the current code has identifiable weaknesses that need addressing.

Key Concerns

  • Unprotected AJAX handler
  • Flows with unsanitized paths
  • Low percentage of properly escaped output
Vulnerabilities
None known

Cloudimage Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Cloudimage Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
18
87 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

83% escaped105 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
cloudimage_check_v7 (admin\class-cloudimage-admin.php:310)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Cloudimage Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_cloudimage_check_v7includes\class-cloudimage.php:191
WordPress Hooks 26
actionshutdownincludes\class-cloudimage-output-buffering.php:40
actionplugins_loadedincludes\class-cloudimage.php:155
actionadmin_enqueue_scriptsincludes\class-cloudimage.php:172
actionadmin_enqueue_scriptsincludes\class-cloudimage.php:173
actionadmin_menuincludes\class-cloudimage.php:176
actionadmin_initincludes\class-cloudimage.php:183
actionadmin_noticesincludes\class-cloudimage.php:186
actionadmin_noticesincludes\class-cloudimage.php:189
actionwp_enqueue_scriptsincludes\class-cloudimage.php:208
actionwp_enqueue_scriptsincludes\class-cloudimage.php:209
filterwp_get_attachment_urlincludes\class-cloudimage.php:212
filterwp_calculate_image_srcsetincludes\class-cloudimage.php:218
filterwp_prepare_attachment_for_jsincludes\class-cloudimage.php:224
filterimage_downsizeincludes\class-cloudimage.php:231
actionwp_headincludes\class-cloudimage.php:238
actioninitincludes\class-cloudimage.php:241
filterthe_contentpublic\class-cloudimage-public.php:1281
actionadmin_menuv4\cloudimage.php:12
actionadmin_initv4\cloudimage.php:15
actionwp_enqueue_scriptsv4\cloudimage.php:18
filterwp_calculate_image_srcsetv4\cloudimage.php:21
actionwp_headv4\cloudimage.php:24
filterwp_headv4\cloudimage.php:25
filterwp_get_attachment_image_attributesv4\cloudimage.php:26
filterplugin_action_linksv4\cloudimage.php:30
actionplugins_loadedv4\cloudimage.php:1178
Maintenance & Trust

Cloudimage Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJan 23, 2026
PHP min version5.6
Downloads48K

Community Trust

Rating88/100
Number of ratings8
Active installs300
Developer Profile

Cloudimage Developer Profile

Scaleflex

3 plugins · 310 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cloudimage

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cloudimage/css/cloudimage-admin.css/wp-content/plugins/cloudimage/js/debounce.js/wp-content/plugins/cloudimage/js/cloudimage-admin.js
Script Paths
https://cdn.scaleflex.com/prod/cloudimage-lazy-load/3.1.2/cloudimage-lazy-load.min.js
Version Parameters
cloudimage-admin.css?ver=debounce.js?ver=cloudimage-admin.js?ver=cloudimage-lazy-load.min.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-cloudimage-gen
JS Globals
Cloudimage
FAQ

Frequently Asked Questions about Cloudimage