Image Shortcake Security & Risk Analysis

wordpress.org/plugins/image-shortcake

When images are inserted into posts from the media library or media uploader, only the html of the `` tag and the link around it (if any) are preserve …

10 active installs v0.1.0 PHP + WP 3.0.1+ Updated Aug 27, 2015
imagesshortcodes
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Image Shortcake Safe to Use in 2026?

Generally Safe

Score 85/100

Image Shortcake has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "image-shortcake" v0.1.0 plugin exhibits a generally positive security posture. Static analysis reveals no dangerous functions, file operations, or external HTTP requests, which are common attack vectors. The plugin also uses prepared statements for all SQL queries and has a high percentage of properly escaped output, indicating good sanitization practices. Furthermore, the absence of known vulnerabilities in its history suggests a stable and well-maintained codebase.

However, there are areas for improvement. The plugin lacks nonce checks on its single shortcode, which, while not a critical issue in isolation given the lack of other entry points, represents a potential weakness. The presence of a capability check is good, but it's the only security mechanism on the shortcode. The total absence of taint analysis flows analyzed is not ideal, as it limits the ability to detect more complex, chained vulnerabilities that might be present.

Overall, the plugin appears to be relatively secure for its current version and feature set. The strengths lie in its careful handling of sensitive operations like database queries and output. The primary concern is the potential for minor vulnerabilities related to the shortcode's input handling due to the absence of nonce checks, though the limited attack surface mitigates this risk significantly. It's crucial to continue this good practice and consider more comprehensive taint analysis in future audits.

Key Concerns

  • Shortcode lacks nonce checks
  • No taint analysis performed
Vulnerabilities
None known

Image Shortcake Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Image Shortcake Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
17 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

94% escaped18 total outputs
Attack Surface

Image Shortcake Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[img] image-shortcake.php:57
WordPress Hooks 4
actionadmin_noticesimage-shortcake.php:62
filtermedia_send_to_editorimage-shortcake.php:72
actionenqueue_shortcode_uiimage-shortcake.php:83
actioninitimage-shortcake.php:114
Maintenance & Trust

Image Shortcake Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedAug 27, 2015
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Image Shortcake Developer Profile

Daniel Bachhuber

9 plugins · 51K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Image Shortcake

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/image-shortcake/assets/js/image-shortcake-admin.js
Script Paths
/wp-content/plugins/image-shortcake/assets/js/image-shortcake-admin.js

HTML / DOM Fingerprints

Shortcode Output
[img
FAQ

Frequently Asked Questions about Image Shortcake