flickree Security & Risk Analysis

wordpress.org/plugins/flickree

Easily get photos from flickr based on a photo, photoset or group ID, a gallery URL or a search text or tag.

10 active installs v0.5 PHP + WP 2.9.1+ Updated Nov 14, 2012
apiflickrgalleryimagesphoto
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is flickree Safe to Use in 2026?

Generally Safe

Score 85/100

flickree has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The flickree plugin, version 0.5, exhibits a mixed security posture with several concerning findings juxtaposed against some good practices. While the absence of recorded CVEs and the consistent use of prepared statements for SQL queries are positive indicators, the plugin has a significant number of unprotected entry points. Specifically, two AJAX handlers lack authentication checks, which could allow unauthenticated users to trigger potentially sensitive functionality. Furthermore, the analysis reveals the presence of dangerous functions like `unserialize` and `create_function`, which are often exploited in various attacks if not handled with extreme care. The complete lack of output escaping is a critical weakness, leaving the plugin vulnerable to Cross-Site Scripting (XSS) attacks. The absence of taint analysis results is neutral, as it indicates no specific flows were identified during the analysis, but it doesn't guarantee the absence of such vulnerabilities.

Despite the lack of historical vulnerabilities, the current code analysis highlights several areas of concern that significantly elevate the risk. The combination of unprotected AJAX endpoints and the lack of output escaping creates a readily exploitable attack surface for XSS and potentially other injection-based vulnerabilities. The use of `unserialize` and `create_function` without proper sanitization or contextual checks is also a red flag. While the plugin demonstrates good practices in SQL query handling, the identified weaknesses in input sanitization and output escaping are more immediate and severe threats. Therefore, this plugin should be treated with caution and ideally updated or patched to address these identified security flaws.

Key Concerns

  • Unprotected AJAX handlers
  • Dangerous functions: unserialize, create_function
  • Output escaping: 0% properly escaped
  • Missing nonce checks
Vulnerabilities
None known

flickree Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

flickree Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
3
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

unserialize$result = unserialize(file_get_contents($url));classes\FlickreeApi.class.php:79
create_functionadd_filter('wp_mail_content_type', create_function('', 'return "text/html";'));classes\FlickreeApi.class.php:115

Bundled Libraries

TinyMCE1.0

Output Escaping

0% escaped1 total outputs
Attack Surface
2 unprotected

flickree Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 2

authwp_ajax_fooAjax.php:15
noprivwp_ajax_fooAjax.php:16

Shortcodes 1

[flickree] Public.php:27
WordPress Hooks 12
actionadmin_initAdmin.php:17
actionadmin_enqueue_scriptsAdmin.php:18
actionadmin_menuAdmin.php:19
filtertiny_mce_versionAdmin.php:31
filtermce_external_pluginsAdmin.php:32
filtermce_buttonsAdmin.php:33
filterwp_mail_content_typeclasses\FlickreeApi.class.php:115
actioninitPublic.php:14
actionwp_enqueue_scriptsPublic.php:15
actionwp_headPublic.php:16
actionwp_footerPublic.php:17
filterwidget_textPublic.php:22
Maintenance & Trust

flickree Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedNov 14, 2012
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

flickree Developer Profile

Global

3 plugins · 520 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect flickree

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/flickree/tinymce.css/wp-content/plugins/flickree/tinymce.js
Script Paths
/wp-content/plugins/flickree/tinymce.js

HTML / DOM Fingerprints

CSS Classes
flickree-wrapflickree_options[report]
Data Attributes
id="flickree_options[apikey]"id="flickree_options[report]"id="flickree_options[cc]"id="flickree-wrap"
JS Globals
flickreeflickree_options
FAQ

Frequently Asked Questions about flickree