DICOM Support Security & Risk Analysis

wordpress.org/plugins/dicom-support

Adds DICOM (standard for medical image format) support to Wordpress!

80 active installs v0.10.7 PHP + WP 4.5+ Updated Mar 17, 2025
dicomhtml5javascript
91
A · Safe
CVEs total1
Unpatched0
Last CVEMar 24, 2025
Download
Safety Verdict

Is DICOM Support Safe to Use in 2026?

Generally Safe

Score 91/100

DICOM Support has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Mar 24, 2025Updated 1yr ago
Risk Assessment

The 'dicom-support' plugin v0.10.7 exhibits a mixed security posture. On the positive side, the static analysis reveals adherence to several good security practices, including 100% proper output escaping, 100% prepared statement usage for SQL queries, and no identified dangerous functions, file operations, or external HTTP requests. The attack surface is also minimal, with only one shortcode and no AJAX handlers or REST API routes found without authentication checks. Taint analysis also shows no critical or high severity flows, indicating that data is generally handled safely.

However, a significant concern arises from the vulnerability history. The plugin has a known medium severity CVE related to Cross-Site Scripting, which was last patched on March 24, 2025. While this specific vulnerability is marked as patched, the existence of an XSS vulnerability, even a medium one, suggests potential weaknesses in input sanitization or output encoding in certain contexts not fully captured by the static analysis. The absence of nonce checks and capability checks on any entry points is a notable omission, especially for the shortcode, as it leaves this entry point potentially vulnerable to unauthorized or unintended execution if malicious data is passed to it.

In conclusion, while the plugin demonstrates strong internal coding practices regarding SQL and output escaping, the historical XSS vulnerability and the lack of robust authentication checks on its single entry point are points of concern. Users should ensure they are on the latest patched version to mitigate known XSS risks and remain vigilant about any future updates that address potential authorization bypasses for the shortcode.

Key Concerns

  • Medium severity vulnerability (XSS)
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
1

DICOM Support Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-12623medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

DICOM Support <= 0.10.6 - Authenticated (Contributor+) Stored Cross-Site Scripting

Mar 24, 2025 Patched in 0.10.7 (1d)
Code Analysis
Analyzed Mar 16, 2026

DICOM Support Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

DICOM Support Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[dcm] DicomSupport.php:40
WordPress Hooks 7
actioninitDicomSupport.php:23
filterupload_mimesDicomSupport.php:37
actionwp_enqueue_scriptsDicomSupport.php:42
filtermedia_send_to_editorDicomSupport.php:45
filterpost_galleryDicomSupport.php:47
actionadmin_print_footer_scriptsDicomSupport.php:50
actionprint_media_templatesDicomSupport.php:53
Maintenance & Trust

DICOM Support Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMar 17, 2025
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings5
Active installs80
Developer Profile

DICOM Support Developer Profile

ivmartel

1 plugin · 80 total installs

94
trust score
Avg Security Score
91/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect DICOM Support

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dicom-support/public/appgui.js/wp-content/plugins/dicom-support/public/applauncher.js/wp-content/plugins/dicom-support/public/style.css/wp-content/plugins/dicom-support/node_modules/konva/konva.min.js/wp-content/plugins/dicom-support/node_modules/jszip/dist/jszip.min.js/wp-content/plugins/dicom-support/node_modules/dwv/decoders/dwv/rle.js/wp-content/plugins/dicom-support/node_modules/dwv/decoders/pdfjs/arithmetic_decoder.js/wp-content/plugins/dicom-support/node_modules/dwv/decoders/pdfjs/util.js+4 more

HTML / DOM Fingerprints

CSS Classes
dwvtoolbarlayerGroup
HTML Comments
<!-- Main container div --><!-- Toolbar --><!-- Layer Container -->
Data Attributes
id="dwv-id="toolbar-id="layerGroup-
JS Globals
startApp
Shortcode Output
<div id="dwv-<div id="toolbar-<div id="layerGroup-
FAQ

Frequently Asked Questions about DICOM Support