Featured Image on Top Security & Risk Analysis

wordpress.org/plugins/featured-image-on-top

Tired of having to move your "Featured Images" metabox to the top? I've got a fix for that!

10 active installs v1.0 PHP + WP 3.3.1+ Updated Apr 16, 2012
editorfeatured-imageimagespost-thumbnails
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Featured Image on Top Safe to Use in 2026?

Generally Safe

Score 85/100

Featured Image on Top has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "featured-image-on-top" v1.0 plugin exhibits a mixed security posture. On the positive side, it has a remarkably small attack surface with no registered AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, it has no known historical vulnerabilities (CVEs), suggesting a relatively clean past. The complete absence of raw SQL queries and file operations are also strong indicators of good security practices.

However, there are significant concerns stemming from the static code analysis. The presence of the `unserialize` function is a critical red flag, as it can lead to Remote Code Execution (RCE) vulnerabilities if used with untrusted data. Compounding this risk is the complete lack of output escaping, meaning any data that is outputted could potentially be rendered in an unsafe manner, leading to Cross-Site Scripting (XSS) vulnerabilities. The absence of nonce and capability checks on any potential entry points (though currently zero) also leaves a door open for future insecure additions.

In conclusion, while the plugin benefits from a small attack surface and no prior vulnerability history, the identified use of `unserialize` and the complete lack of output escaping represent serious security weaknesses that require immediate attention. These are common vectors for severe attacks and should be addressed to improve the plugin's overall security.

Key Concerns

  • Unescaped output detected
  • Dangerous function 'unserialize' detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Featured Image on Top Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Featured Image on Top Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$current_user_metabox_order = unserialize($user_meta['meta-box-order_post'][0]);fit.php:63

Output Escaping

0% escaped3 total outputs
Attack Surface

Featured Image on Top Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadd_meta_boxesfit.php:25
actionadmin_menufit.php:26
Maintenance & Trust

Featured Image on Top Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedApr 16, 2012
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Featured Image on Top Developer Profile

Derrick Tennant

4 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Featured Image on Top

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/featured-image-on-top/fit.php

HTML / DOM Fingerprints

Data Attributes
name="dws_fit[override-user-custom]"
FAQ

Frequently Asked Questions about Featured Image on Top