Image Editor by Pixo Security & Risk Analysis

wordpress.org/plugins/image-editor-by-pixo

Replaces the default image editor in wp-admin with more powerful one - Pixo. It can also be used in the front-end.

800 active installs v2.3.8 PHP 5.2+ WP 3.5+ Updated Dec 1, 2025
image-compressionimage-editorimage-optimizationphoto-editorreplace-image
77
B · Generally Safe
CVEs total2
Unpatched1
Last CVESep 22, 2025
Safety Verdict

Is Image Editor by Pixo Safe to Use in 2026?

Mostly Safe

Score 77/100

Image Editor by Pixo is generally safe to use. 2 past CVEs were resolved.

2 known CVEs 1 unpatched Last CVE: Sep 22, 2025Updated 5mo ago
Risk Assessment

The "image-editor-by-pixo" plugin v2.3.8 presents a mixed security posture with some positive attributes but notable concerns. On the positive side, the plugin demonstrates good practices in SQL query handling, with 100% of queries using prepared statements. It also has a reasonable number of nonce and capability checks relative to its entry points, and no dangerous functions were identified. However, the presence of an unprotected AJAX handler significantly expands the attack surface, creating a direct pathway for unauthenticated malicious input. The taint analysis reveals a concerning number of flows with unsanitized paths, even though they are not classified as critical or high severity in this specific scan.

The vulnerability history is a significant red flag. With two known CVEs, one of which remains unpatched, and both being medium severity with a common theme of Cross-site Scripting (XSS), this plugin has a demonstrated history of security flaws. The recent date of the last vulnerability (2025-09-22) suggests ongoing issues. While the current code scan didn't reveal exploitable vulnerabilities in the same vein, the historical pattern of XSS and the unsanitized paths in the taint analysis strongly suggest a propensity for input validation and output escaping weaknesses.

In conclusion, while the plugin has some strengths in its database interaction and basic security checks, the unprotected AJAX endpoint, concerning taint analysis results, and a history of unpatched XSS vulnerabilities collectively indicate a moderate to high-risk profile. Users should exercise caution, and developers should prioritize patching the known vulnerability and addressing the identified unsanitized input paths.

Key Concerns

  • Unprotected AJAX handler
  • Flows with unsanitized paths
  • Currently unpatched CVEs
  • Output escaping is low (46%)
  • Known XSS vulnerabilities in history
Vulnerabilities
2 published

Image Editor by Pixo Security Vulnerabilities

CVEs by Year

2 CVEs in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2025-58232medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Image Editor by Pixo <= 2.3.8 - Authenticated (Contributor+) Stored Cross-Site Scripting

Sep 22, 2025Unpatched
CVE-2025-5588medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Image Editor by Pixo <= 2.3.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via download Parameter

Jun 25, 2025 Patched in 2.3.7 (1d)
Code Analysis
Analyzed Mar 16, 2026

Image Editor by Pixo Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
27
23 escaped
Nonce Checks
2
Capability Checks
1
File Operations
11
External Requests
1
Bundled Libraries
0

Output Escaping

46% escaped50 total outputs
Data Flows · Security
3 unsanitized

Data Flow Analysis

4 flows3 with unsanitized paths
pixoeditor__handleFormSubmission (pixo.php:676)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Image Editor by Pixo Attack Surface

Entry Points2
Unprotected1

AJAX Handlers 1

authwp_ajax_pixoeditor__uploadFilespixo.php:170

Shortcodes 1

[pixoeditor] frontend.php:3
WordPress Hooks 20
actionwp_headfrontend.php:601
actionadmin_initpixo.php:53
filterwp_image_editorspixo.php:66
actionadmin_headpixo.php:89
actionadmin_noticespixo.php:98
actionadmin_print_stylespixo.php:102
actionadmin_print_scriptspixo.php:107
actionadmin_footerpixo.php:117
filterbulk_actions-uploadpixo.php:195
filterhandle_bulk_actions-uploadpixo.php:204
actionadmin_footerpixo.php:225
actionload-upload.phppixo.php:226
actionadmin_menupixo.php:281
actionnetwork_admin_menupixo.php:282
actioninitpost-types.php:3
filtertiny_mce_before_initpost-types.php:36
filterwp_editor_settingspost-types.php:47
filterdefault_contentpost-types.php:60
actionedit_form_toppost-types.php:70
actionadmin_menupost-types.php:123
Maintenance & Trust

Image Editor by Pixo Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 1, 2025
PHP min version5.2
Downloads23K

Community Trust

Rating76/100
Number of ratings9
Active installs800
Developer Profile

Image Editor by Pixo Developer Profile

Ickata

1 plugin · 800 total installs

84
trust score
Avg Security Score
77/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect Image Editor by Pixo

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/image-editor-by-pixo/admin.css/wp-content/plugins/image-editor-by-pixo/admin.js
Script Paths
https://pixoeditor.com/editor/scripts/bridge.m.js
Version Parameters
image-editor-by-pixo/admin.css?ver=image-editor-by-pixo/admin.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-pixo-id
JS Globals
Pixo
FAQ

Frequently Asked Questions about Image Editor by Pixo