
ImageMagick Engine Security & Risk Analysis
wordpress.org/plugins/imagemagick-engineImprove the quality of re-sized images by replacing standard GD library with ImageMagick.
Is ImageMagick Engine Safe to Use in 2026?
Generally Safe
Score 96/100ImageMagick Engine has a strong security track record. Known vulnerabilities have been patched promptly.
The imagick-engine plugin v1.7.14 exhibits a mixed security posture. While it demonstrates good practices with no unprotected entry points (AJAX, REST API, shortcodes, cron) and a solid number of nonce and capability checks, significant concerns arise from the static analysis. The presence of two dangerous `exec` functions, especially without evidence of taint analysis being performed on them, is a major red flag. Coupled with only 27% of outputs being properly escaped and file operations present, this creates potential avenues for attackers if the inputs to these functions are not rigorously sanitized. The plugin's vulnerability history is a critical issue, with 3 known high-severity CVEs, all of which are surprisingly reported as currently unpatched, although the data contradicts this slightly. The common vulnerability types (OS Command Injection, Deserialization, CSRF) are particularly worrying as they often stem from improper handling of user input, which aligns with the static analysis findings regarding `exec` and output escaping. This plugin requires immediate attention to address its historical vulnerabilities and mitigate risks associated with its code signals.
Key Concerns
- 3 known high severity unpatched CVEs
- 2 dangerous functions (exec)
- Only 27% of outputs properly escaped
- File operations present
ImageMagick Engine Security Vulnerabilities
CVEs by Year
Severity Breakdown
3 total CVEs
ImageMagick Engine <= 1.7.10 - Authenticated (Administrator+) Remote Code Execution
ImageMagick Engine <= 1.7.5 - Cross-Site Request Forgery to PHAR Deserialization
ImageMagick Engine <= 1.7.5 - Cross-Site Request Forgery to Remote Command Execution
ImageMagick Engine Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
ImageMagick Engine Attack Surface
AJAX Handlers 3
WordPress Hooks 8
Maintenance & Trust
ImageMagick Engine Maintenance & Trust
Maintenance Signals
Community Trust
ImageMagick Engine Alternatives
Remove exif and metadata
remove-exif-and-metadata
Automatically remove exif and metadata data after uploading. Just moment supported format: JPG and PNG. Using ImageMagick
atec WebP
atec-webp
Auto convert all BMP, GIF, PNG & JPEG images into the much better WebP format. Supports the GD & ImageMagick libraries.
Easy Watermark
easy-watermark
Allows to add watermark to images automatically on upload or manually.
FancyBox for WordPress
fancybox-for-wordpress
Seamlessly integrates FancyBox lightbox into your WordPress blog: Upload, activate, and you're done. Additional configuration optional.
ThumbPress – Image Management Suite for Performance and Optimization
image-sizes
Disable Thumbnails, Regenerate Thumbnails, Compress Images, Convert to WebP, Find Unused and Large Images, Edit Images, and more with ThumbPress.
ImageMagick Engine Developer Profile
1 plugin · 60K total installs
How We Detect ImageMagick Engine
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/imagemagick-engine/css/ime-admin.css/wp-content/plugins/imagemagick-engine/js/ime-admin.jshttps://cdn.jsdelivr.net/npm/alpinejs@3.x.x/dist/cdn.min.jsimagemagick-engine/css/ime-admin.css?ver=imagemagick-engine/js/ime-admin.js?ver=HTML / DOM Fingerprints
ime-admin-pageime-wrapime-modalime-modal-contentime-modal-headerime-modal-bodyime-modal-footerime-btn-primary+8 more<!-- ImageMagick Engine Admin Page --><!-- ImageMagick Engine Test IM Path Modal --><!-- ImageMagick Engine Image Regeneration Modal -->x-datax-showx-initdata-ime-modal-targetdata-ime-modal-closedata-ime-modal-toggle+1 moreime_admin_ajax_object