Just Unzip Security & Risk Analysis

wordpress.org/plugins/just-unzip

Just Unzip (LGPL Licensed) takes a zip file you upload from the "Write" page, unzips it, stores the zipped files in your upload folder, and …

10 active installs v0.2.2 PHP + WP + Updated Apr 15, 2007
adminmultiplepostunzipupload
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Just Unzip Safe to Use in 2026?

Generally Safe

Score 85/100

Just Unzip has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 18yr ago
Risk Assessment

The "just-unzip" v0.2.2 plugin exhibits a mixed security posture. On the positive side, the static analysis reveals no identified vulnerabilities in its history and a very limited attack surface, with zero AJAX handlers, REST API routes, shortcodes, or cron events exposed without authentication or proper checks. Taint analysis also shows no critical or high-severity issues, indicating a lack of directly exploitable data flow vulnerabilities.

However, the code analysis raises significant concerns regarding the handling of data. A substantial number of file operations (66) coupled with a complete lack of output escaping (0% properly escaped) is a major red flag. While there are no external HTTP requests or dangerous functions, this high volume of unescaped output in file operations could lead to various injection vulnerabilities, depending on how the unzipped content is processed or displayed. The presence of SQL queries that are not prepared (0% using prepared statements) is another critical weakness, potentially exposing the site to SQL injection attacks.

The absence of any recorded vulnerabilities in its history is a positive indicator, but it should not overshadow the internal code quality issues. The plugin appears to have a low external attack surface but internal processing weaknesses that could be exploited if an attacker can trigger the file operations or SQL queries with malicious input. The recommendation would be to urgently address the unescaped output and unprepared SQL queries to improve its overall security.

Key Concerns

  • SQL queries not using prepared statements
  • No output properly escaped
  • High number of file operations without proper checks
Vulnerabilities
None known

Just Unzip Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Just Unzip Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
0 prepared
Unescaped Output
22
0 escaped
Nonce Checks
2
Capability Checks
3
File Operations
66
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared4 total queries

Output Escaping

0% escaped22 total outputs
Attack Surface

Just Unzip Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filteruploading_iframe_srcjust-unzip.php:70
Maintenance & Trust

Just Unzip Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedApr 15, 2007
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Just Unzip Developer Profile

James Revillini

4 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Just Unzip

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/just-unzip/inline-uploading.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Just Unzip