FX random image Security & Risk Analysis

wordpress.org/plugins/fx-random-image

Plugin displays random image from attached images to page or post.

10 active installs v1.0.2 PHP + WP 2.8+ Updated May 20, 2011
imagesrandom
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is FX random image Safe to Use in 2026?

Generally Safe

Score 85/100

FX random image has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "fx-random-image" plugin version 1.0.2 exhibits a mixed security posture. On the positive side, the static analysis reveals a complete absence of known CVEs and no recorded vulnerabilities in its history. Furthermore, the code signals indicate a lack of dangerous functions, file operations, external HTTP requests, and SQL queries that do not utilize prepared statements. The attack surface is also reported as zero, with no AJAX handlers, REST API routes, shortcodes, or cron events identified, suggesting a potentially limited footprint for attackers.

However, significant concerns arise from the output escaping. With 100% of its five identified outputs being improperly escaped, this plugin presents a high risk of cross-site scripting (XSS) vulnerabilities. The absence of nonce checks and capability checks, coupled with zero taint flows analyzed, means that any potential vulnerabilities introduced through these vectors would not have been detected by this analysis. While the attack surface is reported as zero, the lack of proper output sanitization is a critical flaw that can be exploited even without direct entry points.

In conclusion, while the plugin benefits from a clean vulnerability history and a seemingly small attack surface, the critical lack of output escaping renders it highly susceptible to XSS attacks. The absence of other common security checks like nonces and capability checks further exacerbates this risk, leaving potential avenues for exploitation unaddressed. This plugin should be treated with extreme caution due to the severe output escaping deficiency.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

FX random image Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

FX random image Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

FX random image Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initfx-random-image.php:122
Maintenance & Trust

FX random image Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedMay 20, 2011
PHP min version
Downloads4K

Community Trust

Rating74/100
Number of ratings3
Active installs10
Developer Profile

FX random image Developer Profile

AivarasFX

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect FX random image

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
widget_RandomImage
Data Attributes
fx-random-imageRandomImage
Shortcode Output
<a href="wp_get_attachment_url($attach->ID)wp_get_attachment_image($attach->ID,$imagesize,false)
FAQ

Frequently Asked Questions about FX random image