Compress & Upload Security & Risk Analysis

wordpress.org/plugins/compress-then-upload

Compress & Upload images | Automatic Image Optimization

10 active installs v1.0.5 PHP 7.4+ WP 4.9+ Updated Aug 15, 2025
image-compressionimage-optimizationmediaupload-limits
98
A · Safe
CVEs total1
Unpatched0
Last CVEAug 19, 2025
Safety Verdict

Is Compress & Upload Safe to Use in 2026?

Generally Safe

Score 98/100

Compress & Upload has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Aug 19, 2025Updated 7mo ago
Risk Assessment

The "compress-then-upload" plugin v1.0.5 presents a mixed security profile. On the positive side, the static analysis reveals a very clean codebase with no identified dangerous functions, all SQL queries using prepared statements, and all output properly escaped. There are no file operations or external HTTP requests, and the plugin does not appear to have a large attack surface based on the absence of AJAX handlers, REST API routes, shortcodes, or cron events without authentication or permission checks. This indicates good development practices in terms of immediate code-level risks.

However, a significant concern arises from the vulnerability history. The plugin has a known critical CVE related to "Unrestricted Upload of File with Dangerous Type," which was last patched on 2025-08-19. While there are currently no unpatched vulnerabilities, the existence of this past critical vulnerability and its type suggests a potential for severe security issues if similar logic is still present or if future vulnerabilities exploit similar weaknesses. The lack of nonce checks and capability checks in some areas, while not directly exploited in the static analysis, could be entry points for attackers if combined with other vulnerabilities or misconfigurations. The absence of taint analysis flows being reported is also noteworthy; while it could mean no issues were found, it could also indicate that the analysis scope or tooling was limited.

In conclusion, while the immediate code seems well-hardened against common web vulnerabilities, the historical presence of a critical "Unrestricted Upload" vulnerability necessitates a cautious approach. The plugin's strengths lie in its clean coding practices regarding SQL and output escaping. The main weakness is the past critical vulnerability, which highlights a potential area for future exploitation. Users should remain vigilant for updates and consider the impact of this historical vulnerability.

Key Concerns

  • Known critical CVE: Unrestricted Upload of File with Dangerous Type
  • Lack of nonce checks on entry points
  • Lack of capability checks on entry points
Vulnerabilities
1

Compress & Upload Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

CVE-2025-8889high · 7.2Unrestricted Upload of File with Dangerous Type

Compress Then Upload <= 1.0.4 - Authenticated (Admin+) Arbitrary File Upload

Aug 19, 2025 Patched in 1.0.5 (38d)
Code Analysis
Analyzed Mar 17, 2026

Compress & Upload Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Compress & Upload Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitcompress-then-upload.php:35
actionadmin_menuincludes\class-wp-compress-then-upload.php:41
actionrest_api_initincludes\class-wpctu-endpoints.php:120
Maintenance & Trust

Compress & Upload Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedAug 15, 2025
PHP min version7.4
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Compress & Upload Developer Profile

Eli Hanna

2 plugins · 110 total installs

87
trust score
Avg Security Score
99/100
Avg Patch Time
38 days
View full developer profile
Detection Fingerprints

How We Detect Compress & Upload

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/compress-then-upload/front/build/static/css/main.css/wp-content/plugins/compress-then-upload/front/build/static/js/main.js
Script Paths
/wp-content/plugins/compress-then-upload/front/build/static/js/main.js
Version Parameters
compress-then-upload/front/build/static/js/main.js?ver=1.0

HTML / DOM Fingerprints

JS Globals
wpctu_ajax
REST Endpoints
/wp-json/wpctu-api/v1/upload/wp-json/wpctu-api/v1/settings
FAQ

Frequently Asked Questions about Compress & Upload