PrettyGallery Security & Risk Analysis

wordpress.org/plugins/prettygallery

Integrate Wordpress default gallery shortcode ([gallery]) with jquery modal popup.

30 active installs v1.0 PHP + WP 3.3+ Updated Dec 14, 2014
gallerygallery-modal-boxgallery-shortcodejquery-modal-boxwordpress-gallery
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PrettyGallery Safe to Use in 2026?

Generally Safe

Score 85/100

PrettyGallery has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "prettygallery" v1.0 plugin exhibits a strong security posture with no critical vulnerabilities identified in the code. The absence of dangerous functions, SQL injection risks due to prepared statements, and properly escaped output are all positive indicators. The plugin also demonstrates good practice by avoiding file operations and external HTTP requests, further reducing its attack surface. Furthermore, the lack of any recorded vulnerabilities in its history suggests a well-maintained and secure codebase over time.

However, a key area for concern is the complete absence of nonce checks and capability checks. While the current entry points (shortcodes) may not immediately expose a direct security risk without these checks, this practice leaves the plugin susceptible to potential Cross-Site Request Forgery (CSRF) or unauthorized action vulnerabilities if functionality is ever added that modifies data or performs sensitive operations without proper authorization. The lack of any taint analysis results is also noteworthy, which could be due to the limited scope of the analysis or the plugin's simple functionality. Overall, the plugin is secure in its current state but has room for improvement regarding authorization and nonces.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
Vulnerabilities
None known

PrettyGallery Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

PrettyGallery Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped5 total outputs
Attack Surface

PrettyGallery Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[gallery] prettygallery.php:18
WordPress Hooks 2
actionwp_enqueue_scriptsprettygallery.php:19
filterwp_get_attachment_linkprettygallery.php:90
Maintenance & Trust

PrettyGallery Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedDec 14, 2014
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings5
Active installs30
Developer Profile

PrettyGallery Developer Profile

webnoetic

1 plugin · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PrettyGallery

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/prettygallery/css/colorbox.css/wp-content/plugins/prettygallery/js/jquery.colorbox-min.js
Script Paths
/wp-content/plugins/prettygallery/js/jquery.colorbox-min.js
Version Parameters
prettygallery_js?ver=1.0.0

HTML / DOM Fingerprints

CSS Classes
prettygallery_stylegallery-itemgallery-iconwp-caption-textgallery-caption
Data Attributes
rel='wp-prettygallery'
JS Globals
jQuery('[rel=wp-prettygallery]').colorbox()
Shortcode Output
<dl class='gallery galleryid-<dt class='gallery-icon<dd class='wp-caption-text gallery-caption'>
FAQ

Frequently Asked Questions about PrettyGallery