Default Image Settings Security & Risk Analysis

wordpress.org/plugins/default-image-settings

Change default settings for image size, link to and align for images inserted into posts. Allows you to remove the link on images by default.

500 active installs v1.0.2 PHP + WP 3.5+ Updated Nov 29, 2016
defaultdefault-image-settingsimageinsert-postmedia
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Default Image Settings Safe to Use in 2026?

Generally Safe

Score 85/100

Default Image Settings has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "default-image-settings" plugin v1.0.2 exhibits a seemingly strong security posture based on the static analysis and vulnerability history provided. The absence of any reported CVEs, coupled with a complete lack of observed vulnerabilities in its history, suggests a history of secure development or minimal exposure. The static analysis further reinforces this by showing no dangerous functions, no SQL queries (or all using prepared statements if any existed), no file operations, no external HTTP requests, and a clean slate in taint analysis. This indicates that the plugin likely adheres to secure coding practices regarding data handling and input validation.

However, a significant concern arises from the complete absence of any observed entry points (AJAX, REST API, shortcodes, cron events) and the equally concerning lack of any nonce checks or capability checks. While the static analysis reports zero unprotected entry points, the complete lack of any security checks in place on these potential entry points, even if currently zero, represents a latent risk. If future updates introduce any interactive elements or data handling capabilities, the absence of these fundamental security mechanisms could immediately expose the plugin and the WordPress site to vulnerabilities. The 73% output escaping, while not perfect, is also a minor area for improvement, but the primary concern is the foundational lack of security checks on potential interaction points.

Key Concerns

  • Missing capability checks on entry points
  • Missing nonce checks on entry points
  • Output escaping not 100% proper
Vulnerabilities
None known

Default Image Settings Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Default Image Settings Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

73% escaped11 total outputs
Attack Surface

Default Image Settings Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionplugins_loadeddefault-image-settings.php:57
actionadmin_initincludes\admin.php:28
Maintenance & Trust

Default Image Settings Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedNov 29, 2016
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings2
Active installs500
Developer Profile

Default Image Settings Developer Profile

Jesper van Engelen

7 plugins · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Default Image Settings

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Default Image Settings