
Media Folder Security & Risk Analysis
wordpress.org/plugins/media-folderAttach media files to a common parent post, easily upload and list the content of the folder. Useful for making sliders that clients can manage or lis …
Is Media Folder Safe to Use in 2026?
Use With Caution
Score 63/100Media Folder has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The 'media-folder' plugin v1.0.0 presents a mixed security posture. On the positive side, the plugin has a limited attack surface with only one entry point (a shortcode) and no unprotected AJAX handlers or REST API routes. It also avoids dangerous functions and external HTTP requests, and doesn't bundle libraries. However, significant concerns arise from its handling of SQL queries and output escaping. The single SQL query is not using prepared statements, which is a substantial risk for SQL injection, especially given the lack of explicit capability checks on this query if it handles user-supplied data. Furthermore, only 20% of output is properly escaped, indicating a high likelihood of cross-site scripting (XSS) vulnerabilities.
The vulnerability history further exacerbates these concerns. The plugin has a known medium-severity CVE for Cross-Site Scripting, and critically, this vulnerability remains unpatched as of the last reported date. The fact that the most recent vulnerability is an XSS issue aligns with the poor output escaping observed in the static analysis. This pattern suggests a recurring weakness in how the plugin sanitizes and outputs user-provided data, making it susceptible to persistent or reflected XSS attacks. While the plugin has strengths in limiting its attack surface, the unpatched XSS vulnerability and the insecure SQL query handling are critical weaknesses that demand immediate attention.
Key Concerns
- Unpatched CVE: Medium
- Raw SQL without prepared statements
- Low percentage of properly escaped output
- Flow with unsanitized path
- Missing nonce checks (if applicable to shortcode)
Media Folder Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Media Folder <= 1.0.0 - Reflected Cross-Site Scripting
Media Folder Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Media Folder Attack Surface
Shortcodes 1
WordPress Hooks 13
Maintenance & Trust
Media Folder Maintenance & Trust
Maintenance Signals
Community Trust
Media Folder Alternatives
No alternatives data available yet.
Media Folder Developer Profile
2 plugins · 110 total installs
How We Detect Media Folder
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/media-folder/css/media-folder-admin.css/wp-content/plugins/media-folder/js/media-folder-admin.js/wp-content/plugins/media-folder/js/media-folder-admin.jsmedia-folder-admin.css?ver=media-folder-admin.js?ver=HTML / DOM Fingerprints
media-upload-formtype-form Override for preview
*
* If the $_GET['preview_id'] is set, then the user wants to see the preview data.
* There is also the case of previewing a page with post_id = 1, but using get_field
* to load data from another post_id.
* In this case, we need to make sure that the autosave revision is actually related
* to the $post_id variable. If they match, then the autosave data will be used, otherwise,
* the user wants to load data from a completely different post_id
id="file-form"