Physical Custom Upload Folder for Real Media Library Security & Risk Analysis

wordpress.org/plugins/physical-custom-upload-folder

Upload files in your media library to a custom folder structure on your file system created with Real Media Library folders.

900 active installs v1.0.5 PHP + WP 4.0+ Updated Mar 27, 2020
media-library-folderreal-media-libraryreal-physical-mediauploadupload-folder
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Physical Custom Upload Folder for Real Media Library Safe to Use in 2026?

Generally Safe

Score 85/100

Physical Custom Upload Folder for Real Media Library has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The static analysis of the "physical-custom-upload-folder" plugin v1.0.5 reveals a strong security posture in several key areas. The plugin demonstrates excellent practices by implementing 100% prepared statements for SQL queries and 100% proper output escaping, indicating a robust defense against common injection and XSS vulnerabilities. Furthermore, the absence of known CVEs in its history suggests a history of security consciousness or a lack of significant past exploits. The limited attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events, also contributes positively to its security. However, the presence of a "File operations" entry without explicit checks for capability or nonce, coupled with zero capability checks and zero nonce checks across the entire plugin, represents a potential area of concern. While the taint analysis shows no unsanitized paths, the lack of these fundamental security checks for file operations could be exploited if an attacker can trigger them under specific circumstances.

Key Concerns

  • File operation without capability/nonce checks
  • Zero capability checks detected
  • Zero nonce checks detected
Vulnerabilities
None known

Physical Custom Upload Folder for Real Media Library Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Physical Custom Upload Folder for Real Media Library Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0
Attack Surface

Physical Custom Upload Folder for Real Media Library Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actioninitupload_dir-real_media_library.php:32
actionadmin_noticesupload_dir-real_media_library.php:39
filterwp_handle_upload_prefilterupload_dir-real_media_library.php:43
filterwp_handle_uploadupload_dir-real_media_library.php:44
filterdelete_attachmentupload_dir-real_media_library.php:45
filterwp_die_ajax_handlerupload_dir-real_media_library.php:46
filterwp_die_handlerupload_dir-real_media_library.php:47
actionplugin_row_metaupload_dir-real_media_library.php:50
filterupload_dirupload_dir-real_media_library.php:97
Maintenance & Trust

Physical Custom Upload Folder for Real Media Library Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedMar 27, 2020
PHP min version
Downloads15K

Community Trust

Rating82/100
Number of ratings7
Active installs900
Developer Profile

Physical Custom Upload Folder for Real Media Library Developer Profile

Matthias Günter

5 plugins · 4K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Physical Custom Upload Folder for Real Media Library

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Physical Custom Upload Folder for Real Media Library