EXIF Viewer Security & Risk Analysis

wordpress.org/plugins/exif-viewer

EXIF Viewer displays EXIF data in Edit Media Screen, appends EXIF data to JPEG media page content, enables media archives

30 active installs v0.1 PHP + WP 4.8+ Updated Jul 3, 2017
exifimagesjpegmedia
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is EXIF Viewer Safe to Use in 2026?

Generally Safe

Score 85/100

EXIF Viewer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The exif-viewer v0.1 plugin exhibits a remarkably clean static analysis report, indicating strong adherence to security best practices. The absence of dangerous functions, the exclusive use of prepared statements for SQL queries, and proper output escaping are all positive indicators. Furthermore, the lack of file operations and external HTTP requests minimizes potential attack vectors. The plugin also scores well on access control, with no identified shortcodes, cron events, AJAX handlers, or REST API routes, and no unpatched CVEs in its history.

However, the complete absence of nonces and capability checks across all entry points, despite there being none identified, warrants attention. While the attack surface is currently zero, any future addition of functionality without these security measures would introduce significant risks. The current version's simplicity limits its potential for vulnerabilities, but this can also be seen as a weakness if the plugin is intended for broader use and lacks robust authentication and authorization mechanisms.

In conclusion, exif-viewer v0.1 appears to be a secure plugin in its current state due to its minimal functionality and disciplined coding. The primary concern is the potential for introducing vulnerabilities if functionality is added without implementing proper security checks like nonces and capability checks. Its vulnerability history being entirely clear is a testament to its current security posture, but the lack of demonstrated security controls for potential future expansion is a notable weakness.

Key Concerns

  • No nonce checks
  • No capability checks
Vulnerabilities
None known

EXIF Viewer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

EXIF Viewer Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

EXIF Viewer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

EXIF Viewer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterattachment_fields_to_editexif-viewer.php:69
actionedit_attachmentexif-viewer.php:87
filterthe_contentexif-viewer.php:119
filterregister_post_type_argsexif-viewer.php:133
actionpre_get_postsexif-viewer.php:149
Maintenance & Trust

EXIF Viewer Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedJul 3, 2017
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs30
Developer Profile

EXIF Viewer Developer Profile

veleno

2 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect EXIF Viewer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
readonly='readonly'
Shortcode Output
<ul><li>Camera: </li><li>Created timestamp: </li><li>Aperture: </li><li>Focal length:
FAQ

Frequently Asked Questions about EXIF Viewer