IMJOLWP Image Optimizer Security & Risk Analysis

wordpress.org/plugins/imjolwp-image-optimizer

IMJOLWP Image Optimizer automatically converts uploaded images (JPG, PNG, GIF) to WebP format without changing the original image URL, improving page …

80 active installs v1.3 PHP 7.0+ WP 5.0+ Updated May 27, 2025
image-converterimage-optimizationimagickperformancewebp
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is IMJOLWP Image Optimizer Safe to Use in 2026?

Generally Safe

Score 100/100

IMJOLWP Image Optimizer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10mo ago
Risk Assessment

Based on the static analysis and vulnerability history, the "imjolwp-image-optimizer" v1.3 plugin appears to have a strong security posture. The absence of any identified entry points such as AJAX handlers, REST API routes, or shortcodes significantly limits the attack surface. Furthermore, the code demonstrates good security practices by avoiding dangerous functions, utilizing prepared statements for all SQL queries, and properly escaping all output. The lack of file operations and external HTTP requests further reduces potential exposure. The plugin also benefits from a clean vulnerability history, with no known CVEs, indicating a consistent effort towards security.

While the static analysis reveals no immediate critical vulnerabilities within the provided data, the complete absence of nonce checks and capability checks across all potential entry points (even though none were found) represents a potential concern if future versions were to introduce such entry points without adequate authorization. This lack of explicit checks, even in a seemingly secure version, is a point to monitor. The plugin's strengths lie in its clean code and lack of historical vulnerabilities, suggesting good development practices. However, the absence of explicit security checks like nonces and capabilities, even with a zero attack surface in this version, represents a minor weakness in terms of defensive programming.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

IMJOLWP Image Optimizer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

IMJOLWP Image Optimizer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped3 total outputs
Attack Surface

IMJOLWP Image Optimizer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuimjolwp-image-optimizer.php:17
actionadmin_initimjolwp-image-optimizer.php:29
filterwp_handle_uploadimjolwp-image-optimizer.php:97
Maintenance & Trust

IMJOLWP Image Optimizer Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedMay 27, 2025
PHP min version7.0
Downloads530

Community Trust

Rating0/100
Number of ratings0
Active installs80
Developer Profile

IMJOLWP Image Optimizer Developer Profile

Grocoder Web Development Company

1 plugin · 80 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect IMJOLWP Image Optimizer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/imjolwp-image-optimizer/css/admin-style.css/wp-content/plugins/imjolwp-image-optimizer/js/admin-script.js
Script Paths
/wp-content/plugins/imjolwp-image-optimizer/js/admin-script.js

HTML / DOM Fingerprints

CSS Classes
wrapform-table
Data Attributes
name="imjolwp_webp_quality"id="imjolwp_webp_quality"name="imjolwp_remove_metadata"id="imjolwp_remove_metadata"
FAQ

Frequently Asked Questions about IMJOLWP Image Optimizer