
EXMAGE – WordPress Image Links Security & Risk Analysis
wordpress.org/plugins/exmage-wp-image-linksAdd images using external links - Save your storage with EXMAGE effortlessly
Is EXMAGE – WordPress Image Links Safe to Use in 2026?
Generally Safe
Score 99/100EXMAGE – WordPress Image Links has a strong security track record. Known vulnerabilities have been patched promptly.
The 'exmage-wp-image-links' v1.1.1 plugin demonstrates several good security practices. The static analysis reveals no dangerous functions, 100% of SQL queries are prepared, and all identified outputs are properly escaped, indicating robust defensive coding in these areas. Furthermore, the plugin has no REST API routes, shortcodes, or cron events, and its two AJAX handlers are protected by authentication checks, resulting in zero unprotected entry points. Taint analysis also shows no flows with unsanitized paths, reinforcing the idea of safe data handling within the analyzed code. The plugin does not appear to perform file operations or include bundled libraries, further simplifying its security profile.
However, a significant concern arises from the plugin's vulnerability history. It has a total of one known CVE, which was classified as high severity and related to Server-Side Request Forgery (SSRF). While this vulnerability is currently unpatched according to the data, its last occurrence was in April 2022, which might suggest it has since been addressed or is no longer relevant for this specific version if the CVE applies to older versions. The presence of a high-severity SSRF vulnerability in its history, even if resolved or historical, warrants caution. The plugin also makes four external HTTP requests, which, combined with the historical SSRF, presents a potential attack vector if not handled with extreme care, especially if these requests are dynamic or user-influenced.
In conclusion, 'exmage-wp-image-links' v1.1.1 exhibits strong internal code security with prepared SQL, proper output escaping, and protected entry points. The absence of critical taint flows and dangerous functions is commendable. The primary weakness lies in its historical high-severity SSRF vulnerability. While the plugin has no currently unpatched CVEs, the nature of SSRF vulnerabilities necessitates careful consideration, especially given the presence of external HTTP requests. Users should verify that the high-severity vulnerability is indeed patched or not applicable to v1.1.1 before deployment.
Key Concerns
- Historical high severity CVE (SSRF)
- External HTTP requests present
EXMAGE – WordPress Image Links Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
EXMAGE – WordPress Image Links <= 1.0.6 - Admin+ Blind SSRF
EXMAGE – WordPress Image Links Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
EXMAGE – WordPress Image Links Attack Surface
AJAX Handlers 2
WordPress Hooks 33
Maintenance & Trust
EXMAGE – WordPress Image Links Maintenance & Trust
Maintenance Signals
Community Trust
EXMAGE – WordPress Image Links Alternatives
No alternatives data available yet.
EXMAGE – WordPress Image Links Developer Profile
58 plugins · 167K total installs
How We Detect EXMAGE – WordPress Image Links
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/exmage-wp-image-links/assets/css/admin.css/wp-content/plugins/exmage-wp-image-links/assets/js/upload.js/wp-content/plugins/exmage-wp-image-links/assets/js/media-gallery.js/wp-content/plugins/exmage-wp-image-links/assets/js/image-external-url.js/wp-content/plugins/exmage-wp-image-links/assets/js/image-external-url-admin.js/wp-content/plugins/exmage-wp-image-links/assets/js/image-external-url-upload.js/wp-content/plugins/exmage-wp-image-links/assets/js/image-external-url-media-gallery.js/wp-content/plugins/exmage-wp-image-links/assets/js/image-external-url-media-gallery-admin.js/wp-content/plugins/exmage-wp-image-links/assets/js/upload.js/wp-content/plugins/exmage-wp-image-links/assets/js/media-gallery.js/wp-content/plugins/exmage-wp-image-links/assets/js/image-external-url.js/wp-content/plugins/exmage-wp-image-links/assets/js/image-external-url-admin.js/wp-content/plugins/exmage-wp-image-links/assets/js/image-external-url-upload.js/wp-content/plugins/exmage-wp-image-links/assets/js/image-external-url-media-gallery.js+1 moreexmage-wp-image-links/assets/css/admin.css?ver=exmage-wp-image-links/assets/js/upload.js?ver=exmage-wp-image-links/assets/js/media-gallery.js?ver=exmage-wp-image-links/assets/js/image-external-url.js?ver=exmage-wp-image-links/assets/js/image-external-url-admin.js?ver=exmage-wp-image-links/assets/js/image-external-url-upload.js?ver=exmage-wp-image-links/assets/js/image-external-url-media-gallery.js?ver=exmage-wp-image-links/assets/js/image-external-url-media-gallery-admin.js?ver=HTML / DOM Fingerprints
exmage-external-url-wrapperexmage-external-url-inputexmage-external-url-buttonexmage-media-gallery-wrapperexmage-media-gallery-itemexmage-media-gallery-imageexmage-media-gallery-titleexmage-media-gallery-actions+2 more<!-- Short link to Add new media --><!-- wp.media --><!-- External URL column in Media library/mode=list --><!-- Return error when saving external image -->+17 moredata-exmage-external-urldata-exmage-importeddata-exmage-filterEXMAGE_WP_IMAGE_LINKS_VERSIONEXMAGE_WP_IMAGE_LINKS_DIREXMAGE_WP_IMAGE_LINKS_INCLUDESEXMAGE_WP_IMAGE_LINKS_AJAX_URLEXMAGE_WP_IMAGE_LINKS_NONCE