Force HTTPS srcset Security & Risk Analysis

wordpress.org/plugins/force-https-srcset

Replace Responsive images srcset since wp 4.4 to https!

100 active installs v1.0 PHP + WP 4.4+ Updated Dec 19, 2015
httpsresponsive-imagessrcset
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Force HTTPS srcset Safe to Use in 2026?

Generally Safe

Score 85/100

Force HTTPS srcset has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The plugin "force-https-srcset" v1.0 exhibits a generally strong security posture based on the static analysis provided. The absence of dangerous functions, file operations, external HTTP requests, and SQL queries not using prepared statements is highly commendable. Furthermore, the lack of any reported vulnerabilities in its history suggests a commitment to security by the developers. However, a significant concern arises from the output escaping analysis, where 100% of the analyzed outputs are not properly escaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is directly reflected in the plugin's output without proper sanitization. The lack of documented capability checks or nonce checks on any entry points, while the entry points themselves are zero, means that if any were introduced in the future without proper checks, they would be unprotected. The complete absence of taint analysis results might indicate limited testing or that no concerning data flows were detected, but it's difficult to draw firm conclusions from this.

In conclusion, while the plugin avoids many common pitfalls and has a clean vulnerability history, the unescaped output is a critical weakness that needs immediate attention. The plugin developers should prioritize implementing robust output escaping mechanisms to mitigate XSS risks. The zero attack surface is a positive, but the lack of built-in checks on potential future entry points is a minor concern for long-term maintainability. Overall, the plugin has a good foundation, but the unescaped output significantly detracts from its security.

Key Concerns

  • Unescaped output found
Vulnerabilities
None known

Force HTTPS srcset Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Force HTTPS srcset Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Force HTTPS srcset Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterwp_calculate_image_srcsetforce-https-srcset.php:43
actionadmin_initforce-https-srcset.php:44
actionadmin_initforce-https-srcset.php:45
Maintenance & Trust

Force HTTPS srcset Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedDec 19, 2015
PHP min version
Downloads5K

Community Trust

Rating86/100
Number of ratings6
Active installs100
Developer Profile

Force HTTPS srcset Developer Profile

John LeBlanc

8 plugins · 430 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Force HTTPS srcset

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<label><input name="force_https_srcset_everytime" type="checkbox" value="1" /> Force <code>srcset</code> attr's url scheme to <code>https</code></label><p class="description">This option makes srcset url tobe https when you access with <code>http</code>.</p>
FAQ

Frequently Asked Questions about Force HTTPS srcset