Imagine Security & Risk Analysis

wordpress.org/plugins/imagine

A new cool kid on the block gallery plugin completely written with $.AJAX.get() for extremely versatile pages.

10 active installs v0.99.9 PHP + WP 3.0.1+ Updated Jun 12, 2015
ajaxalbumsgalleryimagespictures
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Imagine Safe to Use in 2026?

Generally Safe

Score 85/100

Imagine has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "imagine" plugin version 0.99.9 presents a mixed security posture. On the positive side, the plugin has no recorded vulnerabilities or CVEs, and it does not make external HTTP requests or bundle third-party libraries, which are generally good indicators. However, significant concerns arise from its static analysis. The presence of two AJAX handlers without authentication checks creates a substantial attack vector. Additionally, the complete absence of prepared statements for its 75 SQL queries is a major red flag, indicating a high risk of SQL injection vulnerabilities. While taint analysis didn't reveal critical or high-severity issues in the analyzed flows, the lack of sanitization in all identified flows is still a concern.

The lack of historical vulnerabilities might suggest that the plugin hasn't been a target or that previous versions were not thoroughly audited. The current version, however, exhibits critical weaknesses in its handling of AJAX endpoints and database interactions. The high percentage of unescaped output (41%) further exacerbates the risk by opening the door to potential cross-site scripting (XSS) attacks. Overall, while the plugin is free of known exploits, the identified technical debt in its code significantly elevates its risk profile, requiring immediate attention to address the SQL injection and unauthenticated AJAX handler vulnerabilities.

Key Concerns

  • AJAX handlers without auth checks
  • Raw SQL queries without prepared statements
  • Unescaped output
  • Flows with unsanitized paths
Vulnerabilities
None known

Imagine Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Imagine Code Analysis

Dangerous Functions
0
Raw SQL Queries
75
0 prepared
Unescaped Output
174
251 escaped
Nonce Checks
1
Capability Checks
2
File Operations
7
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared75 total queries

Output Escaping

59% escaped425 total outputs
Data Flows
8 unsanitized

Data Flow Analysis

8 flows8 with unsanitized paths
imagine_ajaxsubmit (imagine-ajax.php:3)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Imagine Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 2

noprivwp_ajax_imagine-ajaxsubmitindex.php:390
authwp_ajax_imagine-ajaxsubmitindex.php:391

Shortcodes 1

[imagine] modules\shortcode.php:40
WordPress Hooks 8
actionwpmu_new_blogindex.php:289
filterwpmu_drop_tablesindex.php:304
actionplugins_loadedindex.php:311
actionadmin_menuindex.php:321
actioninitindex.php:363
actionadmin_enqueue_scriptsindex.php:365
actionadd_meta_boxesmodules\imagine-meta-box.php:19
actionsave_postmodules\imagine-meta-box.php:92
Maintenance & Trust

Imagine Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedJun 12, 2015
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Imagine Developer Profile

mmichel

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Imagine

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/imagine/assets/css/magnific-popup.css/wp-content/plugins/imagine/assets/css/style.css/wp-content/plugins/imagine/assets/css/style.min.css/wp-content/plugins/imagine/assets/js/magnific-popup.js/wp-content/plugins/imagine/assets/js/modernizr.custom.js/wp-content/plugins/imagine/assets/js/script.js/wp-content/plugins/imagine/assets/js/script.min.js/wp-content/plugins/imagine/templates/imagine-gallery-extended.css+7 more
Script Paths
/wp-content/plugins/imagine/assets/js/script.js/wp-content/plugins/imagine/assets/js/script.min.js
Version Parameters
imagine/assets/css/style.css?ver=imagine/assets/css/style.min.css?ver=imagine/assets/js/script.js?ver=imagine/assets/js/script.min.js?ver=

HTML / DOM Fingerprints

CSS Classes
imagine-gallery-extendedimagine-gallery-minifiedimagine-gallery-wallimagine-gallery-sliceboximagine-album-minifiedimagine-album-extendedimagine-image-minified
Data Attributes
data-imagine-gallery-iddata-imagine-album-iddata-imagine-img-iddata-imagine-temp-id
JS Globals
imagineGalleries
Shortcode Output
[imagine_gallery][imagine_album]
FAQ

Frequently Asked Questions about Imagine