JVM Protected Media Security & Risk Analysis

wordpress.org/plugins/jvm-protected-media

Restrict access to all your media files and implement your own custom file access rules.

0 active installs v1.0.6 PHP + WP 4.4.1+ Updated Sep 28, 2022
attachmentsfilesmediaprotectprotection
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is JVM Protected Media Safe to Use in 2026?

Generally Safe

Score 85/100

JVM Protected Media has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "jvm-protected-media" v1.0.6 plugin exhibits a generally strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface. Furthermore, the code signals indicate that all identified outputs are properly escaped, and there are no critical or high severity taint flows. The absence of known vulnerabilities in its history also suggests a well-maintained and secure development practice.

However, the analysis does highlight a couple of areas for concern. The plugin utilizes two SQL queries that do not employ prepared statements, which can be a vulnerability if user-supplied data is incorporated into these queries without proper sanitization. Additionally, there is one file operation noted, and while no specific risks are detailed, file operations inherently carry a risk of insecure handling, especially if they involve user input or external paths. The lack of nonce and capability checks on any potential entry points (though there are none listed) would be a significant concern if they existed, but as it stands, these are not directly applicable.

In conclusion, the plugin appears robust with a minimal attack surface and good output handling. The primary risks stem from the unescaped SQL queries and the general potential of file operations. The complete lack of historical vulnerabilities is a positive indicator. Addressing the SQL query practices and ensuring the file operation is secure would further solidify its security.

Key Concerns

  • SQL queries not using prepared statements
  • File operation without specific security context
Vulnerabilities
None known

JVM Protected Media Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

JVM Protected Media Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries
Attack Surface

JVM Protected Media Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionwp_loadedjvm-protected-media.php:109
actionadmin_noticesjvm-protected-media.php:112
actionadmin_noticesjvm-protected-media.php:117
filtermod_rewrite_rulesjvm-protected-media.php:123
actioninitjvm-protected-media.php:126
actionadmin_initjvm-protected-media.php:133
Maintenance & Trust

JVM Protected Media Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedSep 28, 2022
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

JVM Protected Media Developer Profile

Joris van Montfort

5 plugins · 4K total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
27 days
View full developer profile
Detection Fingerprints

How We Detect JVM Protected Media

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- JVM Protected Media file rewrite rules --><!-- JVM Protected Media file rewrite rules end -->
FAQ

Frequently Asked Questions about JVM Protected Media