Play Random Image Plugin Security & Risk Analysis

wordpress.org/plugins/play-random-image

Play Random Image is a responsive random image generator plugin for WordPress with which you could able to show your users some random information by …

10 active installs v1.0.0 PHP 5.2.4+ WP 4.6+ Updated Jun 16, 2018
galleryrandomrandom-imagerandom-image-gallery
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Play Random Image Plugin Safe to Use in 2026?

Generally Safe

Score 85/100

Play Random Image Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "play-random-image" plugin v1.0.0 presents a mixed security posture. On the positive side, it exhibits good practices by not making external HTTP requests, not performing file operations, and utilizing prepared statements for any SQL queries (though none were detected). The absence of known CVEs and a clean vulnerability history further suggests a generally secure development approach so far. However, there are significant concerns regarding output escaping, as 100% of detected outputs are not properly escaped. This means that data displayed to users could potentially be manipulated, leading to cross-site scripting (XSS) vulnerabilities. Additionally, the plugin lacks explicit capability checks and nonce checks, which are crucial for preventing unauthorized actions and CSRF attacks, especially if the shortcode interacts with sensitive data or functionality.

Key Concerns

  • 100% of outputs unescaped
  • No capability checks
  • No nonce checks
Vulnerabilities
None known

Play Random Image Plugin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Play Random Image Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Play Random Image Plugin Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[Gallery] random-gallery.php:42
WordPress Hooks 5
actioninitrandom-gallery.php:38
actionadd_meta_boxesrandom-gallery.php:39
filtermanage_edit-random_gallery_columnsrandom-gallery.php:40
actionmanage_random_gallery_posts_custom_columnrandom-gallery.php:41
actionwp_enqueue_scriptsrandom-gallery.php:43
Maintenance & Trust

Play Random Image Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJun 16, 2018
PHP min version5.2.4
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Play Random Image Plugin Developer Profile

goigi

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Play Random Image Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/play-random-image/css/style.css

HTML / DOM Fingerprints

CSS Classes
imgwrappercenter-blockcentered-gdbmodalmodal-dialogmodal-contentmodal-headermodal-title+2 more
Data Attributes
data-target="#myModal"onclick="poppic(data-dismiss="modal"onClick="window.location.reload()"id="flip-img"
JS Globals
poppicmodalclose
Shortcode Output
[Gallery id=<div class="imgwrapper "><h2>Click to view random image</h2>
FAQ

Frequently Asked Questions about Play Random Image Plugin