LCS Image Nolink Security & Risk Analysis

wordpress.org/plugins/lcs-image-nolink

New images inserted into posts will have no links by default. Existing self-links on all images are removed before the post content is shown.

10 active installs v1.3 PHP + WP 3.0+ Updated May 5, 2019
imagelinklinkspreventremove
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is LCS Image Nolink Safe to Use in 2026?

Generally Safe

Score 85/100

LCS Image Nolink has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "lcs-image-nolink" v1.3 plugin exhibits a strong security posture in several key areas. The static analysis shows a complete absence of AJAX handlers, REST API routes, shortcodes, and cron events that could serve as entry points. Furthermore, there are no identified dangerous functions, no raw SQL queries, and no external HTTP requests, all of which significantly reduce the potential attack surface. The vulnerability history is also clear, with zero known CVEs, indicating a historically stable plugin.

However, there are critical concerns regarding output escaping. 100% of the identified output operations are not properly escaped, presenting a significant risk of Cross-Site Scripting (XSS) vulnerabilities. While the taint analysis shows no explicit unsanitized paths, the lack of output escaping means that any data flowing into these outputs, even if seemingly sanitized earlier, could be rendered unsafely, leading to XSS attacks if the data originates from user input or external sources. The absence of nonce and capability checks also means that even if an entry point were discovered, there are no built-in protections to verify user authorization or prevent CSRF attacks.

In conclusion, while the plugin avoids many common web application vulnerabilities through its limited functionality and good practices in SQL handling and external requests, the complete lack of output escaping is a major security flaw. This deficiency, combined with the absence of nonce and capability checks, creates a substantial risk of XSS and potentially other injection attacks. The clean vulnerability history is positive but doesn't mitigate the immediate risks identified in the code analysis.

Key Concerns

  • 100% of outputs not properly escaped
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

LCS Image Nolink Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

LCS Image Nolink Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped3 total outputs
Attack Surface

LCS Image Nolink Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterthe_contentlcs_image_nolink.php:29
actionadmin_initlcs_image_nolink.php:64
Maintenance & Trust

LCS Image Nolink Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedMay 5, 2019
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

LCS Image Nolink Developer Profile

latcomsystems

3 plugins · 20 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect LCS Image Nolink

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/lcs-image-nolink/simple_html_dom.php
Version Parameters
lcs-image-nolink/style.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about LCS Image Nolink