DownloadMusic Security & Risk Analysis

wordpress.org/plugins/download-music

Plugin to list all audio files uploaded to a blog, and let users download them in a zip file.

10 active installs v0.1 PHP + WP 2.5+ Updated May 2, 2008
downloadsmusic
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is DownloadMusic Safe to Use in 2026?

Generally Safe

Score 85/100

DownloadMusic has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The "download-music" plugin version 0.1 exhibits several concerning security practices despite having no recorded CVEs or a large attack surface. The static analysis reveals that 0% of its outputs are properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. While the plugin has no AJAX handlers, REST API routes, shortcodes, or cron events that are directly exposed without authentication, the lack of any capability checks or nonce checks means that if any entry points were to be introduced or discovered, they would likely be unprotected. The taint analysis identified two high-severity flows with unsanitized paths, suggesting potential for directory traversal or other path manipulation attacks, especially given the significant number of file operations (71).

The absence of any recorded vulnerabilities in its history might suggest it's a less scrutinized or older plugin, or it has simply been fortunate. However, the code signals strongly indicate a lack of fundamental security implementations. The raw SQL queries and especially the complete absence of nonce and capability checks are significant weaknesses. The presence of unsanitized paths in taint flows, coupled with a lack of output escaping and authorization checks, paints a picture of a plugin that is not built with security as a primary consideration.

Key Concerns

  • High severity unsanitized taint flows
  • High severity unsanitized taint flows
  • 0% output escaping
  • Raw SQL queries without prepare
  • Raw SQL queries without prepare
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

DownloadMusic Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

DownloadMusic Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
1 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
71
External Requests
0
Bundled Libraries
0

SQL Query Safety

33% prepared3 total queries

Output Escaping

0% escaped7 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
output_main_admin_page (download_music.php:257)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

DownloadMusic Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterthe_contentdownload_music.php:170
actionwp_headdownload_music.php:172
Maintenance & Trust

DownloadMusic Maintenance & Trust

Maintenance Signals

WordPress version tested2.5
Last updatedMay 2, 2008
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

DownloadMusic Developer Profile

seanhagen

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect DownloadMusic

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="songs[]"
Shortcode Output
<p><span style="font-size: 10pt; font-style: italic;">Tip: Use the checkboxes to download multiple songs in a single zip file!</span></p><form action="" method="post" name="downloadSongs" style="text-align: left;"><p><input type="checkbox" name="songs[]" value="
FAQ

Frequently Asked Questions about DownloadMusic