
EntryWizard Security & Risk Analysis
wordpress.org/plugins/entrywizardUploading by logged-in users of sets of image files and associated data. Administrators design the upload form, and download the images and data.
Is EntryWizard Safe to Use in 2026?
Generally Safe
Score 100/100EntryWizard has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'entrywizard' plugin v1.3.29 presents a mixed security posture. On the positive side, it demonstrates good practices in several areas. There are no known CVEs associated with this plugin, indicating a stable history and likely diligent maintenance. The static analysis shows a strong emphasis on security checks, with all identified entry points (AJAX handlers, REST API routes, shortcodes, cron events) appearing to have authentication and capability checks in place. Furthermore, the high percentage of SQL queries using prepared statements and a reasonable rate of output escaping are commendable. The absence of external HTTP requests and bundled libraries also reduces potential attack vectors.
However, concerns arise from the presence of dangerous functions such as 'unserialize', 'preg_replace(/e)', and 'popen'. While the taint analysis did not reveal critical or high severity unsanitized flows, the mere existence of these functions can be a significant risk if not handled with extreme care, as they are often associated with remote code execution or deserialization vulnerabilities. The static analysis also found four flows with unsanitized paths, which, while not classified as critical or high, warrant further investigation to understand their potential impact. The ratio of properly escaped outputs, while above 50%, still suggests a small but non-zero risk of cross-site scripting (XSS) vulnerabilities if specific edge cases are not addressed.
Overall, the plugin's history of zero vulnerabilities and robust implementation of authentication/capability checks are strong points. Nevertheless, the identified dangerous functions and unsanitized path flows introduce potential risks that cannot be overlooked. A more in-depth manual code review focusing on the usage of 'unserialize', 'preg_replace(/e)', 'popen', and the identified unsanitized paths would be highly recommended to confirm the absence of exploitable vulnerabilities.
Key Concerns
- Dangerous functions detected (unserialize, preg_replace(/e), popen)
- Unsanitized paths found in taint analysis
- Output escaping not fully comprehensive (70%)
EntryWizard Security Vulnerabilities
EntryWizard Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
EntryWizard Attack Surface
AJAX Handlers 17
Shortcodes 3
WordPress Hooks 27
Scheduled Events 1
Maintenance & Trust
EntryWizard Maintenance & Trust
Maintenance Signals
Community Trust
EntryWizard Alternatives
EWZ-Rating
ewz-rating
Companion plugin to EntryWizard, for display and judging of the uploaded images.
Auto Upload Images
auto-upload-images
Automatically detect external images in the post content and import images to your site then adding to the media library and replace image urls.
Clean Image Filenames
clean-image-filenames
This plugin automatically converts language accent characters to non-accent characters in filenames when uploading to the media library.
Disable "BIG Image" Threshold
disable-big-image-threshold
Disables the "BIG image" threshold introduced in WordPress 5.3.
Disable Media Sizes
disable-media-sizes
Provides options to disable the extra images generated by WordPress.
EntryWizard Developer Profile
2 plugins · 150 total installs
How We Detect EntryWizard
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/entrywizard/css/ewz-public.css/wp-content/plugins/entrywizard/css/ewz-webform.css/wp-content/plugins/entrywizard/javascript/ewz-public.js/wp-content/plugins/entrywizard/javascript/ewz-webform.js/wp-content/plugins/entrywizard/javascript/ewz-admin.js/wp-content/plugins/entrywizard/javascript/ewz-shortcodes.js/wp-content/plugins/entrywizard/javascript/ewz-public.js/wp-content/plugins/entrywizard/javascript/ewz-webform.js/wp-content/plugins/entrywizard/javascript/ewz-admin.js/wp-content/plugins/entrywizard/javascript/ewz-shortcodes.jsentrywizard/javascript/ewz-shortcodes.js?ewzv=HTML / DOM Fingerprints
ewz-public-formewz-webform-containerewz-success-messageewz-error-messageewz-field-labelewz-field-inputewz-submit-buttonewz-admin-upload-wrap+2 more<!-- BEGIN ENTRYWIZARD SHORTCODE --><!-- END ENTRYWIZARD SHORTCODE --><!-- Gutenberg editor notice for EntryWizard -->data-ewz-webform-iddata-ewz-field-idEWZdata/wp-json/entrywizard/v1/webforms/wp-json/entrywizard/v1/upload/wp-json/entrywizard/v1/settings[ewz_show_webform[ewz_followup