Media Placeholders Security & Risk Analysis

wordpress.org/plugins/media-placeholders

Redirect requests to non-existent uploaded images to a placeholder service like placehold.it or placekitten.com. For use during development.

70 active installs v0.9.2 PHP + WP 3.5+ Updated Feb 25, 2015
404developmentimagesplaceholdersuploads
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Media Placeholders Safe to Use in 2026?

Generally Safe

Score 85/100

Media Placeholders has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "media-placeholders" v0.9.2 plugin exhibits a generally strong security posture based on the provided static analysis. It has no recorded vulnerabilities (CVEs) and a clean vulnerability history, suggesting a well-maintained and secure codebase. The absence of dangerous functions, properly escaped output, and the use of prepared statements for all SQL queries are excellent security practices. Furthermore, the plugin demonstrates no external HTTP requests and no bundled libraries, which reduces potential attack vectors.

However, there are a few areas that warrant attention. The presence of two taint flows with unsanitized paths, even without a critical or high severity classification, indicates a potential risk. This suggests that user-supplied data might be used in file operations or other sensitive contexts without adequate sanitization, which could lead to unintended behavior or security issues if exploited. Additionally, the lack of nonce checks and capability checks for any entry points, although the total number of entry points is zero, means that if any were to be introduced in future versions or by accident, they would be unprotected. The single file operation also poses a potential, albeit minor, concern given the taint analysis results.

Key Concerns

  • Unsanitized paths in taint flows
  • No nonce checks
  • No capability checks
  • File operations present
Vulnerabilities
None known

Media Placeholders Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Media Placeholders Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
handle_missing_upload (media-placeholders.php:38)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Media Placeholders Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actiontemplate_redirectmedia-placeholders.php:32
actionplugins_loadedmedia-placeholders.php:190
Maintenance & Trust

Media Placeholders Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedFeb 25, 2015
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs70
Developer Profile

Media Placeholders Developer Profile

Weston Ruter

22 plugins · 437K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
4499 days
View full developer profile
Detection Fingerprints

How We Detect Media Placeholders

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Media Placeholders