Force use of ImageMagick image library Security & Risk Analysis

wordpress.org/plugins/mhm-forceimagemagick

Forces WordPress to use the ImageMagick image library. This plugin is no longer maintained.

100 active installs v1.1.0 PHP + WP 4.5+ Updated Dec 2, 2025
exifimage-generationimagemagickimagesiptc
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Force use of ImageMagick image library Safe to Use in 2026?

Generally Safe

Score 100/100

Force use of ImageMagick image library has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The "mhm-forceimagemagick" plugin, version 1.1.0, exhibits a remarkably secure posture based on the provided static analysis and vulnerability history. The plugin has a completely absent attack surface, meaning there are no direct entry points like AJAX handlers, REST API routes, shortcodes, or cron events that could be directly exploited. Furthermore, the code analysis reveals no dangerous functions, all SQL queries use prepared statements, output is properly escaped, and there are no file operations or external HTTP requests. The complete absence of known vulnerabilities, including any unpatched CVEs, further reinforces its strong security profile. The lack of any recorded vulnerabilities suggests a well-maintained and secure codebase over time.

While the static analysis is highly positive, the complete absence of capability checks and nonce checks, coupled with zero identified flows in taint analysis, is noteworthy. This could indicate either an extremely simple plugin with no user-interactive functionality that would require such checks, or a potential oversight if the plugin does perform actions that would benefit from these security layers. However, given the other strong indicators, it's more probable that the plugin's functionality does not necessitate these checks. Overall, this plugin presents a very low risk, with its strengths lying in its minimal attack surface and clean code practices.

Vulnerabilities
None known

Force use of ImageMagick image library Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Force use of ImageMagick image library Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Force use of ImageMagick image library Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterwp_image_editorsindex.php:20
Maintenance & Trust

Force use of ImageMagick image library Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.0
Last updatedDec 2, 2025
PHP min version
Downloads14K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Force use of ImageMagick image library Developer Profile

Mark Howells-Mead

8 plugins · 2K total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Force use of ImageMagick image library

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Force use of ImageMagick image library