Custom Upload Folders Plus Security & Risk Analysis

wordpress.org/plugins/custom-upload-folders-plus

Organize file uploads by File Type (mov, gif, png, mp3...) and Logged in user (nickname, first-name, last-name...).

10 active installs v1.0.4 PHP + WP 3.8+ Updated Jun 19, 2015
custom-upload-foldersfoldermediaupload
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Custom Upload Folders Plus Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Upload Folders Plus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "custom-upload-folders-plus" v1.0.4 plugin exhibits a mixed security posture. On the positive side, the static analysis reveals no AJAX handlers, REST API routes, shortcodes, or cron events exposed without authentication or authorization checks. Furthermore, all detected SQL queries utilize prepared statements, and there are no recorded vulnerabilities (CVEs) associated with this plugin, suggesting a generally well-maintained and secure development history. The absence of external HTTP requests and file operations also contributes to a reduced attack surface.

However, a significant concern arises from the complete lack of output escaping. With 20 total outputs analyzed and 0% properly escaped, this creates a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is displayed on the front-end or admin area without proper sanitization could be leveraged by attackers to inject malicious scripts. Additionally, the plugin bundles an outdated version of Select2 (v3.5.1), which may have its own known vulnerabilities that are not reflected in the plugin's specific CVE history. The absence of nonce checks and capability checks, while not explicitly tied to an exposed attack vector in this analysis, further contributes to a lack of robust security layering.

Key Concerns

  • All outputs unescaped, high XSS risk
  • Bundled outdated library (Select2 v3.5.1)
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Custom Upload Folders Plus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Upload Folders Plus Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
20
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Select23.5.1

Output Escaping

0% escaped20 total outputs
Attack Surface

Custom Upload Folders Plus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterupload_dircustom-upload-folders-plus.php:65
filteradmin_initcustom-upload-folders-plus.php:69
filterplugin_action_linkscustom-upload-folders-plus.php:73
actionadmin_enqueue_scriptscustom-upload-folders-plus.php:79
Maintenance & Trust

Custom Upload Folders Plus Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedJun 19, 2015
PHP min version
Downloads4K

Community Trust

Rating80/100
Number of ratings4
Active installs10
Developer Profile

Custom Upload Folders Plus Developer Profile

jwight1234

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Upload Folders Plus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-upload-folders-plus/css/jwcuf-style.css/wp-content/plugins/custom-upload-folders-plus/js/jwcuf-script.js
Script Paths
/wp-content/plugins/custom-upload-folders-plus/js/jwcuf-script.js
Version Parameters
custom-upload-folders-plus/css/jwcuf-style.css?ver=custom-upload-folders-plus/js/jwcuf-script.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Custom Upload Folders Plus