Max Image Size Control Security & Risk Analysis

wordpress.org/plugins/max-image-size-control

This plugin adds the functionality to change the max image size each category and post.

300 active installs v0.2.7 PHP + WP 2.7+ Updated Nov 28, 2019
controlimagemaxsizethumbnail
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Max Image Size Control Safe to Use in 2026?

Generally Safe

Score 85/100

Max Image Size Control has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "max-image-size-control" v0.2.7 plugin exhibits a mixed security posture. On the positive side, it demonstrates excellent practices regarding SQL queries by exclusively using prepared statements, and there are no reported vulnerabilities in its history, suggesting a generally stable and well-maintained codebase. Furthermore, the absence of external HTTP requests, file operations, and a clean taint analysis indicate a low risk of common web attack vectors like injection, remote code execution, or sensitive data exfiltration through these means.

However, significant concerns arise from the static analysis. The presence of 10 instances of the `create_function` construct is a critical red flag. This function is deprecated and considered a major security risk due to its ability to execute arbitrary code. Coupled with this, only 20% of output escaping is properly implemented, indicating a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. The complete lack of nonce checks and capability checks on its entry points further exacerbates these risks, allowing unauthenticated or unauthorized users to potentially trigger vulnerable code paths.

In conclusion, while the plugin avoids common pitfalls like raw SQL and external requests, the identified issues with `create_function` and inadequate output escaping present substantial security risks. The lack of historical vulnerabilities is a positive indicator, but the static analysis findings demand immediate attention to mitigate potential XSS and code execution vulnerabilities.

Key Concerns

  • Use of deprecated and dangerous create_function
  • Low percentage of properly escaped output (potential XSS)
  • Missing nonce checks on entry points
  • Missing capability checks on entry points
Vulnerabilities
None known

Max Image Size Control Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Max Image Size Control Code Analysis

Dangerous Functions
10
Raw SQL Queries
0
0 prepared
Unescaped Output
66
17 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionarray_walk( $post_types, create_function('&$v', '$v = trim($v);') );max-image-size-control.php:311
create_functionarray_walk( $ex_post_ids, create_function('&$v', '$v = trim($v);') );max-image-size-control.php:319
create_functionarray_walk( $ex_category_ids, create_function('&$v', '$v = trim($v);') );max-image-size-control.php:321
create_functionarray_walk( $post_ids, create_function('&$v', '$v = trim($v);') );max-image-size-control.php:330
create_functionarray_walk( $category_ids, create_function('&$v', '$v = trim($v);') );max-image-size-control.php:335
create_functionarray_walk( $post_types, create_function('&$v', '$v = trim($v);') );max-image-size-control.php:416
create_functionarray_walk( $ex_post_ids, create_function('&$v', '$v = trim($v);') );max-image-size-control.php:425
create_functionarray_walk( $ex_category_ids, create_function('&$v', '$v = trim($v);') );max-image-size-control.php:427
create_functionarray_walk( $post_ids, create_function('&$v', '$v = trim($v);') );max-image-size-control.php:437
create_functionarray_walk( $category_ids, create_function('&$v', '$v = trim($v);') );max-image-size-control.php:443

Output Escaping

20% escaped83 total outputs
Attack Surface

Max Image Size Control Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionplugins_loadedmax-image-size-control.php:34
actionadmin_headmax-image-size-control.php:35
actionadmin_menumax-image-size-control.php:36
filterintermediate_image_sizesmax-image-size-control.php:37
filterwp_generate_attachment_metadatamax-image-size-control.php:38
filtereditor_max_image_sizemax-image-size-control.php:39
filterimage_downsizemax-image-size-control.php:40
filterattachment_fields_to_editmax-image-size-control.php:41
filterimage_size_names_choosemax-image-size-control.php:42
Maintenance & Trust

Max Image Size Control Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedNov 28, 2019
PHP min version
Downloads34K

Community Trust

Rating0/100
Number of ratings0
Active installs300
Developer Profile

Max Image Size Control Developer Profile

Hiroaki Miyashita

12 plugins · 43K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
223 days
View full developer profile
Detection Fingerprints

How We Detect Max Image Size Control

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/max-image-size-control/js/max-image-size-control.js

HTML / DOM Fingerprints

CSS Classes
max-image-size-control
JS Globals
autosaveLast
FAQ

Frequently Asked Questions about Max Image Size Control