Image Wall Security & Risk Analysis

wordpress.org/plugins/image-wall

Browse posts/pages by their images, displayed randomly on an infinitely scrollable page. The images link back to where they are attached.

200 active installs v3.2 PHP + WP 3.5+ Updated Jun 19, 2025
ajaxgalleriesgalleryimageimages
98
A · Safe
CVEs total2
Unpatched0
Last CVEJul 16, 2025
Safety Verdict

Is Image Wall Safe to Use in 2026?

Generally Safe

Score 98/100

Image Wall has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

2 known CVEsLast CVE: Jul 16, 2025Updated 11mo ago
Risk Assessment

The image-wall plugin v3.2 demonstrates a mixed security posture. On the positive side, the plugin exhibits excellent output escaping practices, with 100% of identified outputs being properly sanitized. It also avoids dangerous functions, file operations, and external HTTP requests, which are common sources of vulnerabilities. The attack surface is relatively small with only one shortcode identified as an entry point, and importantly, none of these entry points are initially unprotected.

However, there are significant concerns. The plugin has a history of two medium-severity Cross-Site Scripting (XSS) vulnerabilities, with the most recent one being in the future, which is highly unusual and suggests potential data manipulation or an error in the reporting. A critical weakness is the lack of nonce checks. Coupled with SQL queries that are entirely un-prepared, this opens the door to potential SQL injection and Cross-Site Request Forgery (CSRF) attacks, especially if any of the shortcode inputs are not robustly validated before being used in queries. The presence of capability checks is a positive, but its effectiveness is diminished by the lack of nonce protection and un-prepared SQL.

In conclusion, while the plugin excels in output sanitization and avoids several common risky practices, the complete absence of nonce checks and the reliance on raw SQL queries without prepared statements represent serious security flaws. The historical medium-severity XSS vulnerabilities, despite being marked as patched, indicate past weaknesses that users should be aware of. A user should weigh the strong output sanitization against the significant risks posed by the lack of nonce and prepared statement usage.

Key Concerns

  • No nonce checks
  • 100% SQL queries un-prepared
  • 2 medium severity CVEs historically
Vulnerabilities
2 published

Image Wall Security Vulnerabilities

CVEs by Year

2 CVEs in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2025-48156medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Image Wall <= 3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting

Jul 16, 2025 Patched in 3.2 (6d)
CVE-2025-30869medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Image Wall <= 3.0 - Reflected Cross-Site Scripting

Mar 27, 2025 Patched in 3.1 (7d)
Code Analysis
Analyzed Mar 16, 2026

Image Wall Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
0
31 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

100% escaped31 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
image_wall_options (image-wall.php:137)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Image Wall Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[image_wall] image-wall.php:380
WordPress Hooks 7
actioniw_attachment_hash_regenerateimage-wall.php:80
actionadd_attachmentimage-wall.php:81
filterqueryimage-wall.php:122
actionadmin_menuimage-wall.php:133
filtercron_schedulesimage-wall.php:323
filterbody_classimage-wall.php:349
actionwp_enqueue_scriptsimage-wall.php:358

Scheduled Events 5

iw_attachment_hash_regenerate
iw_attachment_hash_regenerate
iw_attachment_hash_regenerate
iw_attachment_hash_regenerate
iw_attachment_hash_regenerate
Maintenance & Trust

Image Wall Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJun 19, 2025
PHP min version
Downloads33K

Community Trust

Rating98/100
Number of ratings54
Active installs200
Developer Profile

Image Wall Developer Profile

Parakoos

1 plugin · 200 total installs

99
trust score
Avg Security Score
98/100
Avg Patch Time
7 days
View full developer profile
Detection Fingerprints

How We Detect Image Wall

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/image-wall/image-wall.css/wp-content/plugins/image-wall/image-wall.js
Script Paths
/wp-content/plugins/image-wall/image-wall.js
Version Parameters
image-wall/image-wall.css?ver=image-wall/image-wall.js?ver=

HTML / DOM Fingerprints

CSS Classes
wrapicon32
HTML Comments
Copyright 2012 Gustav Andersson (email : mail@themodernnomad.com)There are two parts of the license of the Image Wall. The first part isthe bit that I have written, which is everything in image-wall.css, image-wall.js andimage-wall.php. Those items are copyrighted under the GPLv2 license described below.+40 more
Data Attributes
styleidclassnamevaluetype+7 more
FAQ

Frequently Asked Questions about Image Wall