
IMGspider – 图片采集抓取插件 Security & Risk Analysis
wordpress.org/plugins/imgspiderIMGspider(图片蜘蛛)是一款用于WordPress文章图片抓取的WordPress插件,支持JPG, JPEG, PNG, GIF, BMP, TIF等常见图片爬取下载,实现一键抓取文章内容所有引用图片到本地服务器。 Pro版本是在原有的IMGspider图片采集插件基础上,进行全新的功能扩 …
Is IMGspider – 图片采集抓取插件 Safe to Use in 2026?
Use With Caution
Score 68/100IMGspider – 图片采集抓取插件 has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The imgspider plugin exhibits a mixed security posture. On the positive side, the static analysis reveals a minimal attack surface of unprotected entry points, robust use of prepared statements for SQL queries, and a high rate of proper output escaping. This suggests developers are generally aware of and implementing some good security practices. However, there are significant concerns highlighted by the vulnerability history and taint analysis. The plugin has a history of three known CVEs, with one currently unpatched and two classified as high severity. The common vulnerability types, Server-Side Request Forgery (SSRF) and Unrestricted Upload of File with Dangerous Type, are particularly serious and can lead to severe system compromise. The taint analysis also indicates a flow with unsanitized paths, which, while not classified as critical or high in this specific scan, is a strong indicator of potential vulnerabilities, especially in conjunction with the plugin's past issues.
The presence of an unpatched high-severity vulnerability is a critical red flag. Coupled with the recurring nature of dangerous vulnerability types, this suggests a pattern of insecure coding practices that have led to exploitable flaws. While the current static analysis doesn't reveal critical issues in the analyzed code paths, the historical context strongly implies that latent vulnerabilities or vulnerabilities in unanalyzed code could exist or reappear. Therefore, despite some positive aspects in the static analysis, the overall risk associated with imgspider v2.3.12 is substantial due to the unpatched critical vulnerability and the historical patterns of severe security flaws.
Key Concerns
- Unpatched CVE (High Severity)
- Taint flow with unsanitized paths
- Historical SSRF vulnerabilities
- Historical Unrestricted Upload vulnerabilities
IMGspider – 图片采集抓取插件 Security Vulnerabilities
CVEs by Year
Severity Breakdown
3 total CVEs
IMGspider <= 2.3.12 - Authenticated (Contributor+) Server-Side Request Forgery
IMGspider <= 2.3.10 - Authenticated (Contributor+) Arbitrary File Upload via 'upload_img_file'
IMGspider <= 2.3.10 - Authenticated (Contributor+) Arbitrary File Upload via 'upload'
IMGspider – 图片采集抓取插件 Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
IMGspider – 图片采集抓取插件 Attack Surface
AJAX Handlers 2
WordPress Hooks 22
Scheduled Events 2
Maintenance & Trust
IMGspider – 图片采集抓取插件 Maintenance & Trust
Maintenance Signals
Community Trust
IMGspider – 图片采集抓取插件 Alternatives
No alternatives data available yet.
IMGspider – 图片采集抓取插件 Developer Profile
11 plugins · 17K total installs
How We Detect IMGspider – 图片采集抓取插件
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/imgspider/setting/assets/js/chunk-vendors.js/wp-content/plugins/imgspider/setting/assets/js/app.js/wp-content/plugins/imgspider/assets/wbp_setting.css/wp-content/plugins/imgspider/setting/assets/css/chunk-vendors.csssetting/assets/js/chunk-vendors.jssetting/assets/js/app.jsimgspider/style.css?ver=setting/assets/js/chunk-vendors.js?ver=setting/assets/js/app.js?ver=assets/wbp_setting.css?ver=setting/assets/css/chunk-vendors.css?ver=HTML / DOM Fingerprints
wbp-img-scrapydata-vue-appwb_ajaxurlwb_vue_pathimgspider_verwb_cnfpost_typespost_status+1 more