OSS Aliyun Security & Risk Analysis

wordpress.org/plugins/oss-aliyun

使用阿里云对象存储 OSS 作为附件存储空间。(This is a plugin that uses Aliyun Object Storage Service for attachments remote saving.)

3K active installs v1.5.1 PHP 7.1+ WP 4.6+ Updated Dec 5, 2025
aliyun%e9%98%bf%e9%87%8c%e4%ba%91oss%e5%af%b9%e8%b1%a1%e5%ad%98%e5%82%a8
98
A · Safe
CVEs total1
Unpatched0
Last CVEMar 28, 2024
Safety Verdict

Is OSS Aliyun Safe to Use in 2026?

Generally Safe

Score 98/100

OSS Aliyun has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Mar 28, 2024Updated 4mo ago
Risk Assessment

The oss-aliyun plugin v1.5.1 exhibits a mixed security posture. On the positive side, static analysis reveals no identified dangerous functions, all SQL queries are properly prepared, and a high percentage of output is correctly escaped. The plugin also implements at least one nonce and capability check, indicating some adherence to WordPress security best practices. The attack surface appears minimal, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events without authentication checks, and no external HTTP requests were detected. The taint analysis also shows no flows with unsanitized paths, further suggesting careful handling of input.

However, a significant concern arises from the plugin's vulnerability history. It has a past critical vulnerability related to SQL injection, and its last known vulnerability was very recent (March 2024). While currently unpatched CVEs are zero, the existence of a critical past vulnerability, especially one that was SQL injection related, is a red flag that warrants caution. This history suggests that while current code might be cleaner, the plugin has had significant security flaws in the past, which could indicate potential for new vulnerabilities to emerge or for the past vulnerability to be reintroduced if not managed diligently. The presence of a file operation and the inclusion of the Guzzle library as a bundled dependency also merit attention for potential security implications, though no specific issues are flagged in the static analysis for these components.

In conclusion, the plugin has made progress in securing its codebase, as evidenced by the static analysis findings. The absence of immediate exploitable flaws in the current version's code is reassuring. Nevertheless, the critical historical vulnerability, particularly the SQL injection type, necessitates ongoing vigilance. Users should ensure they are on the latest version, monitor for future updates, and be aware of the plugin's past security record. The low number of identified issues in static analysis is good, but the historical context requires a slightly elevated level of caution.

Key Concerns

  • Critical severity CVE history
  • Bundled library (Guzzle)
  • File operations detected
Vulnerabilities
1

OSS Aliyun Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Critical
1

1 total CVE

CVE-2024-30494critical · 9.1Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

OSS Aliyun <= 1.4.10 - Authenticated (Administrator+) SQL Injection

Mar 28, 2024 Patched in 1.4.11 (7d)
Code Analysis
Analyzed Mar 16, 2026

OSS Aliyun Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
8
50 escaped
Nonce Checks
1
Capability Checks
1
File Operations
1
External Requests
0
Bundled Libraries
1

Bundled Libraries

Guzzle

SQL Query Safety

100% prepared4 total queries

Output Escaping

86% escaped58 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
oss_setting_page (aliyun-oss-wordpress.php:771)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

OSS Aliyun Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 18
filterwp_update_attachment_metadataaliyun-oss-wordpress.php:372
filterwp_handle_uploadaliyun-oss-wordpress.php:387
filterwp_generate_attachment_metadataaliyun-oss-wordpress.php:388
filterwp_save_image_editor_filealiyun-oss-wordpress.php:389
actiondelete_attachmentaliyun-oss-wordpress.php:453
filterwp_get_attachment_urlaliyun-oss-wordpress.php:463
filtersanitize_file_namealiyun-oss-wordpress.php:479
filterplugin_action_linksaliyun-oss-wordpress.php:528
filterwp_calculate_image_srcsetaliyun-oss-wordpress.php:551
filterwp_prepare_attachment_for_jsaliyun-oss-wordpress.php:553
filterthe_contentaliyun-oss-wordpress.php:570
filterpost_thumbnail_htmlaliyun-oss-wordpress.php:595
filterwp_get_attachment_urlaliyun-oss-wordpress.php:679
filterwp_get_attachment_thumb_urlaliyun-oss-wordpress.php:680
filterwp_get_original_image_urlaliyun-oss-wordpress.php:681
filterwp_prepare_attachment_for_jsaliyun-oss-wordpress.php:682
filterimage_get_intermediate_sizealiyun-oss-wordpress.php:683
actionadmin_menualiyun-oss-wordpress.php:768
Maintenance & Trust

OSS Aliyun Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 5, 2025
PHP min version7.1
Downloads34K

Community Trust

Rating96/100
Number of ratings5
Active installs3K
Developer Profile

OSS Aliyun Developer Profile

沈唁

13 plugins · 4K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
143 days
View full developer profile
Detection Fingerprints

How We Detect OSS Aliyun

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/oss-aliyun/sdk/vendor/aliyuncs/oss-sdk-php/src/OSS/Core/OssException.php/wp-content/plugins/oss-aliyun/sdk/vendor/autoload.php

HTML / DOM Fingerprints

Data Attributes
oss_options
FAQ

Frequently Asked Questions about OSS Aliyun