
ImageRecycle pdf & image compression Security & Risk Analysis
wordpress.org/plugins/imagerecycle-pdf-image-compressionImageRecycle image & PDF compression. Make WordPress loads faster by using an automatic image and PDF optimization.
Is ImageRecycle pdf & image compression Safe to Use in 2026?
Generally Safe
Score 97/100ImageRecycle pdf & image compression has a strong security track record. Known vulnerabilities have been patched promptly.
The security posture of the "imagerecycle-pdf-image-compression" plugin v3.1.18 presents a mixed picture. On one hand, the plugin demonstrates a strong adherence to secure coding practices in several areas. The vast majority of SQL queries (95%) utilize prepared statements, which is excellent for preventing SQL injection. Additionally, a significant number of nonce checks (19) and capability checks (15) are present, indicating an effort to protect against common WordPress vulnerabilities. The absence of critical or high-severity taint flows is also a positive sign. However, there are notable concerns that temper this otherwise positive assessment. The presence of 4 AJAX handlers without authentication checks represents a significant attack surface that could be exploited by unauthenticated users. The use of the 'exec' function, a dangerous function that can execute arbitrary commands, also raises red flags, especially when coupled with potential input sanitization issues. The vulnerability history reveals a pattern of 15 medium-severity CVEs, primarily related to Cross-Site Request Forgery (CSRF), Missing Authorization, and Cross-Site Scripting (XSS). While no vulnerabilities are currently unpatched, the consistent appearance of these types of issues in the past suggests recurring development weaknesses in input validation and authorization logic.
In conclusion, while the plugin has implemented some robust security measures, particularly regarding database interactions, the unprotected AJAX endpoints and the use of dangerous functions like 'exec' introduce significant risks. The historical prevalence of medium-severity vulnerabilities in common areas like authorization and XSS indicates that ongoing vigilance and code review are necessary. Developers should prioritize addressing the unprotected AJAX handlers and carefully review the implementation of 'exec' and any associated input handling to mitigate potential exploitation. The plugin's strengths lie in its database security, but its weaknesses in authentication for certain entry points and the presence of powerful but risky functions warrant careful attention to prevent future security incidents.
Key Concerns
- AJAX handlers without authentication checks
- Presence of dangerous function 'exec'
- Medium severity vulnerabilities in history (15)
- Output escaping not consistently applied (51%)
- Taint flows with unsanitized paths (2)
ImageRecycle pdf & image compression Security Vulnerabilities
CVEs by Year
Severity Breakdown
15 total CVEs
ImageRecycle pdf & image compression <= 3.1.16 - Reflected Cross-Site Scripting
ImageRecycle pdf & image compression <= 3.1.14 - Missing Authorization in Several AJAX Actions
ImageRecycle pdf & image compression <= 3.1.14 - Cross-Site Request in Several AJAX Actions
ImageRecycle pdf & image compression <= 3.1.13 - Cross-Site Request Forgery to Settings Update in enableOptimization
ImageRecycle pdf & image compression <= 3.1.13 - Missing Authorization to Settings Update in enableOptimization
ImageRecycle pdf & image compression <= 3.1.13 - Cross-Site Request Forgery to Plugin Data Removal in reinitialize
ImageRecycle pdf & image compression <= 3.1.13 - Missing Authorization to Plugin Data Removal in reinitialize
ImageRecycle pdf & image compression <= 3.1.13 - Cross-Site Request Forgery to Settings Update in stopOptimizeAll
ImageRecycle pdf & image compression <= 3.1.13 - Missing Authorization to Settings Update in optimizeAllOn
ImageRecycle pdf & image compression <= 3.1.13 - Cross-Site Request Forgery to Settings Update in disableOptimization
ImageRecycle pdf & image compression <= 3.1.13 - Cross-Site Request Forgery to Settings Update in optimizeAllOn
ImageRecycle pdf & image compression <= 3.1.13 - Missing Authorization to Settings Update in disableOptimization
ImageRecycle pdf & image compression <= 3.1.13 - Missing Authorization to Settings Update in stopOptimizeAll
ImageRecycle pdf & image compression <= 3.1.11 - Reflected Cross-Site Scripting
ImageRecycle pdf & image compression <= 3.1.10 - Reflected Cross-Site Scripting
ImageRecycle pdf & image compression Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
ImageRecycle pdf & image compression Attack Surface
AJAX Handlers 18
WordPress Hooks 28
Scheduled Events 2
Maintenance & Trust
ImageRecycle pdf & image compression Maintenance & Trust
Maintenance Signals
Community Trust
ImageRecycle pdf & image compression Alternatives
Image Optimizer – Optimize Images and Convert to WebP or AVIF
image-optimization
Automatically resize, optimize, and convert images to WebP and AVIF. Compress images in bulk or on upload to boost your WordPress site performance.
QuickWebP – Compress / Optimize Images & Convert WebP | SEO Friendly
quickwebp
QuickWebP is a free WordPress plugin that converts images to WebP, optimizes performance, improves SEO, auto-fills metadata, and resizes images—no API …
Squeeze – Image Optimization & Compression, WEBP Conversion
squeeze
Unlimited. Private. Instant. Squeeze compresses and converts your images directly in your browser — no external servers and no upload limits.
Image to WebP Converter
image-to-webp-converter
Automatically convert uploaded images (PNG, JPG, JPEG) to WebP format to enhance website performance and reduce load times.
Image Editor by Pixo
image-editor-by-pixo
Replaces the default image editor in wp-admin with more powerful one - Pixo. It can also be used in the front-end.
ImageRecycle pdf & image compression Developer Profile
1 plugin · 1K total installs
How We Detect ImageRecycle pdf & image compression
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/imagerecycle-pdf-image-compression/css/wpio-admin-style.css/wp-content/plugins/imagerecycle-pdf-image-compression/css/wpio-dashboard-style.css/wp-content/plugins/imagerecycle-pdf-image-compression/css/wpio-media-style.css/wp-content/plugins/imagerecycle-pdf-image-compression/css/wpio-style.css/wp-content/plugins/imagerecycle-pdf-image-compression/js/wpio-admin-script.js/wp-content/plugins/imagerecycle-pdf-image-compression/js/wpio-media-script.js/wp-content/plugins/imagerecycle-pdf-image-compression/js/wpio-script.js/wp-content/plugins/imagerecycle-pdf-image-compression/irfeedback/css/irfeedback.css/wp-content/plugins/imagerecycle-pdf-image-compression/js/wpio-admin-script.js/wp-content/plugins/imagerecycle-pdf-image-compression/js/wpio-media-script.js/wp-content/plugins/imagerecycle-pdf-image-compression/js/wpio-script.js/wp-content/plugins/imagerecycle-pdf-image-compression/irfeedback/js/irfeedback.jsimagerecycle-pdf-image-compression/css/wpio-admin-style.css?ver=imagerecycle-pdf-image-compression/css/wpio-dashboard-style.css?ver=imagerecycle-pdf-image-compression/css/wpio-media-style.css?ver=imagerecycle-pdf-image-compression/css/wpio-style.css?ver=imagerecycle-pdf-image-compression/js/wpio-admin-script.js?ver=imagerecycle-pdf-image-compression/js/wpio-media-script.js?ver=imagerecycle-pdf-image-compression/js/wpio-script.js?ver=imagerecycle-pdf-image-compression/irfeedback/css/irfeedback.css?ver=imagerecycle-pdf-image-compression/irfeedback/js/irfeedback.js?ver=HTML / DOM Fingerprints
wpio-optimizewpio-optimizedwpio-pendingwpio-errorwpio-queued<!-- WPIO_STATS_WIDGET_START --><!-- WPIO_STATS_WIDGET_END --><!-- ImageRecycle widget --><!-- WPIOCONFIG -->+5 moredata-wpio-actiondata-wpio-iddata-wpio-noncedata-wpio-imgdata-wpio-statusdata-wpio-optimize-allwpio_paramswpio_admin_paramswpio_media_paramswpio_ajax_objectirfeedback_params/wp-json/wpio/v1/optimize/wp-json/wpio/v1/settings/wp-json/wpio/v1/queue/wp-json/wpio/v1/revert/wp-json/wpio/v1/scan/wp-json/wpio/v1/status