Imsanity Security & Risk Analysis

wordpress.org/plugins/imsanity

Automatically resizes huge image uploads. Are contributors uploading huge photos? Tired of manually resizing your images? Imsanity to the rescue!

200K active installs v2.9.0 PHP 7.4+ WP 6.6+ Updated Feb 10, 2026
imagequalityresizescalespace-saver
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Imsanity Safe to Use in 2026?

Generally Safe

Score 100/100

Imsanity has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "imsanity" plugin version 2.9.0 exhibits a generally strong security posture with no known historical vulnerabilities. The static analysis reveals a robust implementation of security best practices, with all identified entry points (AJAX handlers) protected by authorization checks. The plugin also demonstrates good output escaping practices, with a high percentage of outputs being properly escaped. Furthermore, the absence of taint flows with unsanitized paths indicates a cautious approach to handling user-supplied data.

Despite the positive findings, there is a single code signal of concern: the use of the `unserialize()` function. While the static analysis did not identify any direct exploitation paths from this, `unserialize()` is inherently risky as it can lead to Remote Code Execution (RCE) if used with untrusted input. The plugin's vulnerability history being completely clear is a significant positive, suggesting consistent development and security focus. However, the presence of `unserialize()` remains a potential weakness that could be exploited if input validation is ever bypassed or if a future vulnerability is introduced in how serialized data is handled.

In conclusion, "imsanity" v2.9.0 is a well-developed plugin with a strong emphasis on security. Its lack of known vulnerabilities and protected entry points are commendable. The primary area for attention is the potential risk associated with `unserialize()`. Addressing this by avoiding its use or implementing rigorous validation of serialized data would further solidify its security.

Key Concerns

  • Use of unserialize() function
Vulnerabilities
None known

Imsanity Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Imsanity Code Analysis

Dangerous Functions
1
Raw SQL Queries
6
2 prepared
Unescaped Output
10
43 escaped
Nonce Checks
10
Capability Checks
7
File Operations
7
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize? unserialize( $result )settings.php:482

SQL Query Safety

25% prepared8 total queries

Output Escaping

81% escaped53 total outputs
Data Flows
All sanitized

Data Flow Analysis

3 flows
imsanity_get_images (ajax.php:17)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Imsanity Attack Surface

Entry Points4
Unprotected0

AJAX Handlers 4

authwp_ajax_imsanity_get_imagesajax.php:8
authwp_ajax_imsanity_resize_imageajax.php:9
authwp_ajax_imsanity_remove_originalajax.php:10
authwp_ajax_imsanity_bulk_completeajax.php:11
WordPress Hooks 15
filterwp_handle_uploadimsanity.php:397
actionplugins_loadedimsanity.php:399
filtermanage_media_columnsimsanity.php:402
actionmanage_media_custom_columnimsanity.php:404
filterimsanity_allowed_mimesimsanity.php:406
filterimsanity_allowed_mimesimsanity.php:408
actionadmin_menusettings.php:15
actionnetwork_admin_menusettings.php:16
actionadmin_enqueue_scriptssettings.php:19
actionadmin_initsettings.php:20
filterbig_image_size_thresholdsettings.php:21
actionadmin_noticessettings.php:131
actionnetwork_admin_noticessettings.php:132
actionadmin_print_scriptssettings.php:133
actionnetwork_admin_noticessettings.php:452
Maintenance & Trust

Imsanity Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 10, 2026
PHP min version7.4
Downloads4.5M

Community Trust

Rating98/100
Number of ratings291
Active installs200K
Developer Profile

Imsanity Developer Profile

nosilver4u

5 plugins · 1.4M total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
1275 days
View full developer profile
Detection Fingerprints

How We Detect Imsanity

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/imsanity/css/settings.css/wp-content/plugins/imsanity/js/settings.js
Script Paths
/wp-content/plugins/imsanity/js/settings.js
Version Parameters
imsanity/css/settings.css?ver=imsanity/js/settings.js?ver=

HTML / DOM Fingerprints

CSS Classes
imsanity-settings-pageimsanity-form-groupimsanity-input-groupimsanity-alert
HTML Comments
<!-- BEGIN IMSANITY SETTINGS --><!-- END IMSANITY SETTINGS --><!-- BEGIN IMAGE DATA --><!-- END IMAGE DATA -->+24 more
Data Attributes
data-imsanity-convert-to-jpgdata-imsanity-max-widthdata-imsanity-max-heightdata-imsanity-avif-qualitydata-imsanity-webp-quality
JS Globals
imsanity_settings_params
REST Endpoints
/wp-json/imsanity/v1/settings
FAQ

Frequently Asked Questions about Imsanity