Default Media Uploader View Security & Risk Analysis

wordpress.org/plugins/default-media-uploader-view

Sets "Uploaded to this post" instead of "All media items" as the default view in the media uploader.

600 active installs v1.0.8 PHP 5.3+ WP 3.5+ Updated May 16, 2019
adminattachmentsfiltermediaupload
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Default Media Uploader View Safe to Use in 2026?

Generally Safe

Score 85/100

Default Media Uploader View has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The default-media-uploader-view plugin v1.0.8 demonstrates an exceptionally strong security posture based on the provided static analysis. The absence of any identified attack surface entry points, including AJAX handlers, REST API routes, shortcodes, and cron events, is a significant strength. Furthermore, the code signals indicate a complete absence of dangerous functions, all SQL queries are properly prepared, and all outputs are correctly escaped. The plugin also does not perform file operations or external HTTP requests, and crucially, it lacks nonce and capability checks. While the absence of these checks might typically raise concerns, in this context, it appears to be a deliberate design choice or indicative of a very simple plugin with no user-facing functionalities that would require such protections. The complete lack of any recorded vulnerabilities or CVEs further reinforces its secure standing. However, the complete lack of any identified flows in the taint analysis is unusual and could suggest an extremely simple plugin or potential limitations in the static analysis tools used. Without any entry points or complex operations, the plugin appears to be very safe, but its simplicity limits the depth of the security analysis that can be performed.

Vulnerabilities
None known

Default Media Uploader View Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Default Media Uploader View Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Default Media Uploader View Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_enqueue_mediadefault-media-uploader-view.php:61
actionplugins_loadeddefault-media-uploader-view.php:89
Maintenance & Trust

Default Media Uploader View Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedMay 16, 2019
PHP min version5.3
Downloads15K

Community Trust

Rating96/100
Number of ratings13
Active installs600
Developer Profile

Default Media Uploader View Developer Profile

leemon

3 plugins · 700 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Default Media Uploader View

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/default-media-uploader-view/default-media-uploader-view.js
Script Paths
/wp-content/plugins/default-media-uploader-view/default-media-uploader-view.js
Version Parameters
default-media-uploader-view.js?ver=

HTML / DOM Fingerprints

JS Globals
defaultMediaUploaderView
FAQ

Frequently Asked Questions about Default Media Uploader View