JS Crop Security & Risk Analysis

wordpress.org/plugins/js-crop

Plugin which enables user to crop image and upload it which can be access with media page,

40 active installs v3.1.0 PHP 7.0+ WP 5.0+ Updated Apr 18, 2025
blockdeep-learningimage-cropimage-upload
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is JS Crop Safe to Use in 2026?

Generally Safe

Score 100/100

JS Crop has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11mo ago
Risk Assessment

The js-crop plugin version 3.1.0 exhibits a concerning security posture, primarily due to its unprotected entry points. The static analysis reveals two AJAX handlers that lack any authentication or capability checks, creating a significant attack surface. Furthermore, the taint analysis indicates two flows with unsanitized paths, suggesting a potential for unexpected behavior or vulnerabilities if these paths are user-controlled. While the plugin shows strengths in avoiding dangerous functions, using prepared statements for SQL, and having no recorded vulnerability history, these positive aspects are overshadowed by the critical flaws in its input validation and access control for AJAX requests. The absence of nonce checks and capability checks on these handlers is a major concern, as it could allow unauthenticated users to trigger potentially harmful operations within the plugin.

Key Concerns

  • Unprotected AJAX handlers
  • Taint flows with unsanitized paths
  • Missing nonce checks on AJAX
  • Missing capability checks on AJAX
  • Low output escaping coverage
Vulnerabilities
None known

JS Crop Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

JS Crop Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
11
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

8% escaped12 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
processImage (js-crop.php:29)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

JS Crop Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_process_imagejs-crop.php:17
noprivwp_ajax_process_imagejs-crop.php:18
WordPress Hooks 1
actioninitjs-crop.php:19
Maintenance & Trust

JS Crop Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 18, 2025
PHP min version7.0
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

JS Crop Developer Profile

UjW0L

17 plugins · 2K total installs

93
trust score
Avg Security Score
99/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect JS Crop

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/js-crop/build/index.js/wp-content/plugins/js-crop/build/style-index.css
Script Paths
/wp-content/plugins/js-crop/build/index.js
Version Parameters
js-crop/build/index.js?ver=js-crop/build/style-index.css?ver=

HTML / DOM Fingerprints

Data Attributes
data-ajax-url
Shortcode Output
<div id="image-load"<input id="upload-img" type="file"<p><a id="browse-image" href="javascript:void(0)">Browse</a> or Drop image here</p>
FAQ

Frequently Asked Questions about JS Crop