Disable WebP By Default Security & Risk Analysis

wordpress.org/plugins/disable-webp-by-default

A small plugin to control WebP image creation when JPEG images are uploaded.

200 active installs v0.7.0 PHP 7.0+ WP 5.8+ Updated Feb 6, 2025
imagejpegmediawebp
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Disable WebP By Default Safe to Use in 2026?

Generally Safe

Score 92/100

Disable WebP By Default has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "disable-webp-by-default" plugin v0.7.0 exhibits a generally positive security posture based on the provided static analysis. The absence of detected AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the analysis indicates no dangerous functions are used, and all detected output is properly escaped, mitigating risks associated with code injection and cross-site scripting (XSS). The lack of file operations, external HTTP requests, and identified taint flows without proper sanitization further reinforces this favorable assessment. The plugin's vulnerability history is also clean, with no recorded CVEs, suggesting a well-maintained and secure codebase over time.

However, a key concern arises from the presence of SQL queries that are not using prepared statements. While there are only two such queries, this represents a potential vulnerability to SQL injection if the input to these queries is not rigorously sanitized elsewhere. The complete absence of nonce checks and capability checks across all potential entry points (though currently zero) is a theoretical risk. If the plugin were to introduce any new entry points in the future without these security measures, it could become vulnerable to CSRF or unauthorized access. Overall, the plugin is quite secure but has room for improvement regarding SQL query handling and future-proofing against potential future entry points.

Key Concerns

  • Raw SQL queries without prepared statements
Vulnerabilities
None known

Disable WebP By Default Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Disable WebP By Default Release Timeline

v0.7.0Current
v0.6.0
v0.5.0
v0.4.0
v0.3.0
v0.2.0
v0.1.0
Code Analysis
Analyzed Mar 16, 2026

Disable WebP By Default Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries
Attack Surface

Disable WebP By Default Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_insert_sitedisable-webp-by-default.php:74
filteradmin_initdisable-webp-by-default.php:90
filterwp_upload_image_mime_transformsdisable-webp-by-default.php:97
Maintenance & Trust

Disable WebP By Default Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedFeb 6, 2025
PHP min version7.0
Downloads4K

Community Trust

Rating100/100
Number of ratings5
Active installs200
Developer Profile

Disable WebP By Default Developer Profile

David Baumwald

9 plugins · 12K total installs

90
trust score
Avg Security Score
94/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Disable WebP By Default

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/disable-webp-by-default/inc/activator.php/wp-content/plugins/disable-webp-by-default/inc/deactivator.php/wp-content/plugins/disable-webp-by-default/inc/class-disable-webp-by-default.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Disable WebP By Default