Mega Lazyload Security & Risk Analysis

wordpress.org/plugins/dmo-spacer-gif-generator

Whether building a masonry grid, or trying to increase pagespeed, sometimes it makes sense to use a png as a spacer. Mega lazyload generates automatic …

0 active installs v2.1.0 PHP 5.6+ WP 4.7.1+ Updated Unknown
lazyloadpagespeed-lazyloadingpngspacerspacer-images
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mega Lazyload Safe to Use in 2026?

Generally Safe

Score 100/100

Mega Lazyload has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "dmo-spacer-gif-generator" plugin v2.1.0 exhibits a mixed security posture. On the positive side, it has no recorded vulnerabilities and shows good practice with 100% of its SQL queries utilizing prepared statements, and no external HTTP requests or bundled libraries. Taint analysis also reveals no issues with unsanitized paths.

However, significant concerns arise from the static analysis. The plugin has a single entry point via an AJAX handler that lacks any authentication or capability checks. This makes it an unprotected entry point susceptible to unauthorized access. Furthermore, a critical finding is that 0% of the 23 output operations are properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The absence of nonce checks on the AJAX handler further exacerbates the risk of CSRF attacks.

Given the absence of a vulnerability history, it's difficult to ascertain past security practices. However, the current code analysis highlights immediate and serious risks, particularly the unprotected AJAX handler and widespread output escaping issues. While the plugin demonstrates strengths in database query handling and avoiding external dependencies, the identified entry point and output vulnerabilities present a considerable security risk that needs urgent attention.

Key Concerns

  • Unprotected AJAX handler
  • Output escaping not properly implemented
  • Missing nonce checks on AJAX handler
  • No capability checks on entry points
Vulnerabilities
None known

Mega Lazyload Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Mega Lazyload Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
23
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped23 total outputs
Attack Surface
1 unprotected

Mega Lazyload Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_mll_generatormll_sgg.php:251
WordPress Hooks 9
actionadmin_menuclasses\mll_options.class.php:10
actionadmin_initclasses\mll_options.class.php:11
actionplugins_loadedmll_sgg.php:54
actionadmin_enqueue_scriptsmll_sgg.php:63
actionwp_enqueue_scriptsmll_sgg.php:72
actionwp_footermll_sgg.php:88
actionwp_headmll_sgg.php:96
actionsave_postmll_sgg.php:176
actionthe_contentmll_sgg.php:353
Maintenance & Trust

Mega Lazyload Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedUnknown
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Mega Lazyload Developer Profile

M39A

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mega Lazyload

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mega-lazyload/assets/css/styles.min.css/wp-content/plugins/mega-lazyload/assets/js/script.min.js/wp-content/plugins/mega-lazyload/assets/js/lazyload.min.js
Script Paths
assets/js/lazyload.min.jsassets/js/script.min.js

HTML / DOM Fingerprints

CSS Classes
mega-lazyload
JS Globals
lazyLoadInstance
FAQ

Frequently Asked Questions about Mega Lazyload