PBP IUL Security & Risk Analysis

wordpress.org/plugins/pbp-iul

Increase upload size limit up to more & more.

10 active installs v2.1 PHP + WP 3.0+ Updated Apr 24, 2015
increaselimitmore-and-moreup-toupload
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PBP IUL Safe to Use in 2026?

Generally Safe

Score 85/100

PBP IUL has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The plugin 'pbp-iul' v2.1 exhibits a generally strong security posture from a static analysis perspective, with no detected AJAX handlers, REST API routes, shortcodes, or cron events without proper authorization checks. The code signals also indicate a positive lack of dangerous functions, file operations, and external HTTP requests. Furthermore, all SQL queries are secured with prepared statements, and there are no known vulnerabilities or CVEs associated with this plugin, suggesting a mature and well-maintained codebase. However, the static analysis reveals a significant weakness in output escaping, with only 25% of identified outputs being properly escaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities if the unescaped data is user-controlled or originates from untrusted sources. The taint analysis, while limited in scope, identified two flows with unsanitized paths, which could potentially lead to vulnerabilities if these paths are exploited, although no critical or high severity issues were flagged.

Key Concerns

  • Low output escaping coverage
  • Unsanitized paths found in taint analysis
Vulnerabilities
None known

PBP IUL Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

PBP IUL Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

25% escaped4 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
upload_max_file_size (pbp-iul.php:37)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

PBP IUL Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menupbp-iul.php:28
filterupload_size_limitpbp-iul.php:85
filterplugin_action_linkspbp-iul.php:93
Maintenance & Trust

PBP IUL Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedApr 24, 2015
PHP min version
Downloads10K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

PBP IUL Developer Profile

projoktibangla

5 plugins · 60 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PBP IUL

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
Below are the formform end
FAQ

Frequently Asked Questions about PBP IUL