Custom Image_Src Security & Risk Analysis

wordpress.org/plugins/custom-image-src

Specify a custom sharing image for Facebook. You can upload an image, use the first image in the post, or use the post thumbnail.

100 active installs v0.31 PHP + WP 3.0+ Updated Oct 25, 2011
facebookimage_srcsocial-sharing
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Custom Image_Src Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Image_Src has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "custom-image-src" plugin v0.31 exhibits a generally good security posture based on the provided static analysis. The absence of entry points like AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the attack surface. Furthermore, all detected SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are common vectors for vulnerabilities. The presence of nonce and capability checks, though minimal in number, indicates some awareness of WordPress security best practices.

However, a significant concern arises from the complete lack of output escaping (0% properly escaped). This means that any data rendered by the plugin, even if it doesn't directly come from user input, could potentially be vulnerable to Cross-Site Scripting (XSS) attacks. If the plugin does process any user-controllable data that is then outputted, this represents a critical security flaw. The taint analysis showing zero flows is positive, but this could be a result of either no data flowing or insufficient analysis depth given the lack of output escaping.

With no recorded vulnerabilities in its history, the plugin appears to have been maintained without known serious issues. However, the complete lack of output escaping is a fundamental security oversight that overshadows the other positive findings. The plugin's strengths lie in its limited attack surface and secure data handling for SQL. Its primary weakness, the unescaped output, presents a substantial risk that requires immediate attention.

Key Concerns

  • No output escaping found
  • Minimal capability checks
  • Minimal nonce checks
Vulnerabilities
None known

Custom Image_Src Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Image_Src Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
21
0 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped21 total outputs
Attack Surface

Custom Image_Src Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actionadmin_enqueue_scriptscustom-image-src.php:42
actionwp_headcustom-image-src.php:62
actionadmin_footerincludes\MediaAccess.php:82
actionadmin_headincludes\MetaBox.php:16
actionadmin_footerincludes\MetaBox.php:18
actionadmin_initincludes\MetaBox.php:491
actionimport_post_metaincludes\MetaBox.php:494
filteroutputincludes\MetaBox.php:531
actionsave_postincludes\MetaBox.php:541
actionadmin_headincludes\MetaBox.php:581
actionadmin_footerincludes\MetaBox.php:583
Maintenance & Trust

Custom Image_Src Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedOct 25, 2011
PHP min version
Downloads12K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Custom Image_Src Developer Profile

OverlappingElvis

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Image_Src

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Custom Image_Src