Force Featured Image Security & Risk Analysis

wordpress.org/plugins/force-featured-image

Ever wanted to force a user to publish a post with a featured image of a certain dimension? Search no more.

10 active installs v0.2.0 PHP + WP 3.5+ Updated Feb 25, 2015
adminfeaturedfeatured-imageimagetinymce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Force Featured Image Safe to Use in 2026?

Generally Safe

Score 85/100

Force Featured Image has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The force-featured-image plugin v0.2.0 exhibits a generally strong security posture based on the provided static analysis. The complete absence of identified AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points is a significant positive. Furthermore, the code demonstrates a commitment to secure database interactions, with all SQL queries utilizing prepared statements, and there are no recorded critical or high-severity taint flows. The plugin also has no known vulnerabilities in its history, suggesting a well-maintained codebase.

However, there are areas for improvement that introduce minor risks. The most notable concern is the lack of output escaping for the single identified output. This could potentially lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is directly rendered without proper sanitization. The absence of nonce checks and capability checks, while not directly tied to specific entry points in this analysis, could be a point of weakness if future functionality introduces new interactive elements without these essential security measures. The presence of a file operation without further context also warrants cautious observation.

In conclusion, force-featured-image v0.2.0 is a relatively secure plugin due to its limited attack surface and secure database practices. The primary risk lies in the unescaped output. Addressing this, along with potentially implementing nonce and capability checks for future development, would further solidify its security.

Key Concerns

  • Unescaped output found
  • File operation without context
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Force Featured Image Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Force Featured Image Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Force Featured Image Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedforce-featured-image.php:58
actionafter_setup_themeforce-featured-image.php:59
filteradmin_post_thumbnail_htmlforce-featured-image.php:90
filterwp_insert_post_dataforce-featured-image.php:91
actionadmin_noticesforce-featured-image.php:92
filterredirect_post_locationforce-featured-image.php:141
Maintenance & Trust

Force Featured Image Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedFeb 25, 2015
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Force Featured Image Developer Profile

Jonathan Bardo

5 plugins · 710 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Force Featured Image

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/force-featured-image/force-featured-image.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Force Featured Image