Dynamic Image Resizer Security & Risk Analysis

wordpress.org/plugins/dynamic-image-resizer

Make your images change sizes dynamically.

200 active installs v1.0 PHP + WP 3.2+ Updated Apr 30, 2012
dynamicimagejpgresizeruploader
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Dynamic Image Resizer Safe to Use in 2026?

Generally Safe

Score 85/100

Dynamic Image Resizer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The plugin "dynamic-image-resizer" v1.0 exhibits a strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, significantly limiting the potential attack surface. The code also adheres to secure coding practices by utilizing prepared statements for all SQL queries and ensuring proper output escaping. Furthermore, the absence of critical or high-severity taint flows indicates that data is likely being handled safely within the plugin's logic.

The plugin's vulnerability history is also clean, with no recorded CVEs. This, combined with the positive static analysis findings, suggests a well-developed and secure plugin. The only detected operation is a single file operation, which in itself is not inherently risky without further context, but it is noted as the sole interaction with the file system. The lack of nonce and capability checks, while not directly exploited due to the limited attack surface, is a practice that could become a concern if the plugin were to expand its functionality or introduce new entry points without corresponding security measures.

In conclusion, "dynamic-image-resizer" v1.0 appears to be a secure plugin. Its minimal attack surface, reliance on prepared statements, and proper output escaping are significant strengths. The absence of known vulnerabilities further bolsters this assessment. The primary area for potential improvement would be the implementation of nonce and capability checks, which would further enhance its security posture should its feature set evolve.

Key Concerns

  • No Nonce checks implemented
  • No Capability checks implemented
Vulnerabilities
None known

Dynamic Image Resizer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Dynamic Image Resizer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0
Attack Surface

Dynamic Image Resizer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actiontemplate_redirectdynamic-image-resizer.php:14
filterintermediate_image_sizes_advanceddynamic-image-resizer.php:56
filterwp_generate_attachment_metadatadynamic-image-resizer.php:68
Maintenance & Trust

Dynamic Image Resizer Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedApr 30, 2012
PHP min version
Downloads16K

Community Trust

Rating100/100
Number of ratings5
Active installs200
Developer Profile

Dynamic Image Resizer Developer Profile

Samuel Wood (Otto)

9 plugins · 167K total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
3759 days
View full developer profile
Detection Fingerprints

How We Detect Dynamic Image Resizer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Dynamic Image Resizer