Image Sitemap Security & Risk Analysis

wordpress.org/plugins/image-sitemap

Generate the sitemap then submit the sitemap to webmaster tools to get high traffics from image search engine.

400 active installs v1.3 PHP + WP 3.0.1+ Updated Dec 6, 2014
image-sitemapsitemapsitemap-imagexml-sitemap
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Image Sitemap Safe to Use in 2026?

Generally Safe

Score 85/100

Image Sitemap has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "image-sitemap" plugin version 1.3 presents a mixed security profile. On the positive side, there are no recorded vulnerabilities (CVEs) and the static analysis indicates a seemingly small attack surface with zero identified AJAX handlers, REST API routes, shortcodes, or cron events that lack authentication or permission checks. Furthermore, no dangerous functions or external HTTP requests were detected.

However, significant concerns arise from the code analysis. The presence of raw SQL queries without prepared statements is a critical security weakness that could lead to SQL injection vulnerabilities. Additionally, a complete lack of output escaping means that any data processed or displayed by the plugin is vulnerable to cross-site scripting (XSS) attacks. The taint analysis revealing two flows with unsanitized paths, even without a critical or high severity, suggests potential pathways for malicious input to reach sensitive parts of the code. The absence of nonce and capability checks, while not directly tied to an attack surface in this analysis, indicates a general disregard for common WordPress security best practices.

Given the absence of known vulnerabilities and a limited attack surface, the plugin currently appears to be in a low-risk state. Nevertheless, the detected weaknesses in handling SQL and output are serious and could be easily exploited. It is crucial for the plugin developers to address these issues to prevent future vulnerabilities.

Key Concerns

  • Raw SQL queries without prepared statements
  • Unescaped output
  • Flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Image Sitemap Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Image Sitemap Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped4 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
image_sitemap_loop (sitemap-image.php:63)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Image Sitemap Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menusitemap-image.php:11
Maintenance & Trust

Image Sitemap Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedDec 6, 2014
PHP min version
Downloads13K

Community Trust

Rating88/100
Number of ratings8
Active installs400
Developer Profile

Image Sitemap Developer Profile

Prayoga Teguh

1 plugin · 400 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Image Sitemap

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrap
JS Globals
twitter-wjs
FAQ

Frequently Asked Questions about Image Sitemap