
Manual Image Crop Security & Risk Analysis
wordpress.org/plugins/manual-image-cropPlugin allows you to manually crop all the image sizes registered in your WordPress theme (in particular featured image).
Is Manual Image Crop Safe to Use in 2026?
Generally Safe
Score 100/100Manual Image Crop has a strong security track record. Known vulnerabilities have been patched promptly.
The "manual-image-crop" plugin version 1.13 exhibits a concerning security posture, primarily due to its unprotected entry points. The static analysis reveals two AJAX handlers with no authentication or capability checks, presenting a direct attack surface for unauthenticated users. While the plugin demonstrates good practices in its use of prepared statements for SQL queries and output escaping, and has no reported critical or high severity vulnerabilities in its history, the lack of authorization on its AJAX endpoints is a significant weakness.
The vulnerability history, while showing no currently unpatched CVEs, does indicate a past medium severity Cross-Site Scripting (XSS) vulnerability from 2015. This historical context, combined with the current lack of nonce and capability checks on critical entry points, suggests a potential for the introduction of new vulnerabilities if the plugin is not actively maintained and secured. The absence of taint analysis results is neutral, but the overall picture is one of a plugin with good internal coding practices but critical external security oversights.
In conclusion, while the plugin avoids common pitfalls like raw SQL or unescaped output, the exposed AJAX handlers without any form of authorization represent a significant security risk. This makes the plugin vulnerable to potential abuse by malicious actors who could trigger these functions. The lack of nonce checks on these AJAX actions further exacerbates this issue. Until these unprotected entry points are secured, the plugin should be considered a moderate to high risk.
Key Concerns
- Unprotected AJAX handlers found
- Missing nonce checks on AJAX handlers
- No capability checks on AJAX handlers
- Past medium XSS vulnerability
Manual Image Crop Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Manual Image Crop <= 1.10 - Reflected Cross-Site Scripting
Manual Image Crop Code Analysis
Manual Image Crop Attack Surface
AJAX Handlers 2
WordPress Hooks 2
Maintenance & Trust
Manual Image Crop Maintenance & Trust
Maintenance Signals
Community Trust
Manual Image Crop Alternatives
Acme Fix Images – Regenerate Thumbnails
acme-fix-images
Fix image sizes after you have changed image sizes from Media Settings. Ensure your images display consistently across your website.
B7 Multiple Featured Images for Post
b7-multiple-featured-images-for-post
Enhance your posts by adding multiple featured images with ease.
Clickable Featured Image
clickable-featured-image
Make featured images clickable. Opens in lightbox on posts, links to post on archives. Zero configuration.
Random Post Thumbnail
random-post-thumbnail
Easy way to add random featured images to your posts.
Auto Featured Image (Auto Post Thumbnail)
auto-post-thumbnail
Automatically generate, assign, and manage featured images in bulk so every post on your site has a featured image.
Manual Image Crop Developer Profile
1 plugin · 8K total installs
How We Detect Manual Image Crop
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/manual-image-crop/css/microp.css/wp-content/plugins/manual-image-crop/css/microp-editor.css/wp-content/plugins/manual-image-crop/js/microp.js/wp-content/plugins/manual-image-crop/js/microp-editor.jsmanual-image-crop/css/microp.css?ver=manual-image-crop/css/microp-editor.css?ver=manual-image-crop/js/microp.js?ver=manual-image-crop/js/microp-editor.js?ver=HTML / DOM Fingerprints
microp-editor-containerdata-microp-editormicrop_localemicrop_editor_config