Remote Media Libraries Security & Risk Analysis

wordpress.org/plugins/remote-medias-lite

Remote Media Libraries (RML) gives you access to third parties media libraries directly from the Wordpress Media Library.

200 active installs v1.6.3 PHP 5.4+ WP 3.5+ Updated Oct 3, 2018
dailymotionflickrmedia-libraryvimeoyoutube
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Remote Media Libraries Safe to Use in 2026?

Generally Safe

Score 85/100

Remote Media Libraries has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The remote-medias-lite plugin, version 1.6.3, exhibits a generally strong security posture based on the provided static analysis. The absence of any known CVEs, unpatched vulnerabilities, or recorded common vulnerability types in its history is a significant positive indicator. The plugin also demonstrates good practices by avoiding external HTTP requests and file operations, and it has a relatively small number of SQL queries, with a portion utilizing prepared statements. However, there are a few areas of concern that warrant attention. The presence of the `unserialize` function is a significant risk, as it can lead to remote code execution if the data being unserialized originates from an untrusted source. While the static analysis didn't find any specific taint flows related to this, the potential for misuse is high.

Further investigation is needed into the implementation of capability checks and the escaping of output. Although capability checks are present, their effectiveness depends entirely on how they are implemented in relation to user input. Similarly, while 70% of output is properly escaped, the 30% that is not could still present an unescaped output vulnerability. The lack of nonce checks on potential entry points (if any were present, which the analysis shows as zero) and the reliance on capability checks alone for authorization could be a weakness if input is not thoroughly validated and sanitized. Overall, the plugin has a good track record and a limited attack surface, but the `unserialize` function and the potential for insecure output handling present moderate risks.

Key Concerns

  • Use of unserialize function
  • 1/3 SQL queries not using prepared statements
  • 30% of outputs not properly escaped
  • Bundled library (Guzzle) - potential for outdated versions
Vulnerabilities
None known

Remote Media Libraries Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Remote Media Libraries Code Analysis

Dangerous Functions
1
Raw SQL Queries
2
1 prepared
Unescaped Output
18
42 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

unserialize$data = unserialize($response->getBody());src\RemoteMediaExt\Accounts\Flickr\Service.php:99

Bundled Libraries

Guzzle

SQL Query Safety

33% prepared3 total queries

Output Escaping

70% escaped60 total outputs
Attack Surface

Remote Media Libraries Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionplugins_loadedremote-medias-libs.php:24
actionadmin_noticesremote-medias-libs.php:26
filterpost_updated_messagessrc\RemoteMediaExt\AccountPostType.php:44
actioncurrent_screensrc\RemoteMediaExt\AccountPostType.php:45
actionadmin_noticessrc\RemoteMediaExt\AccountPostType.php:83
actiontemplate_redirectsrc\RemoteMediaExt\Accounts\AbstractAuthService.php:10
actionadmin_enqueue_scriptssrc\RemoteMediaExt\FRemoteMediaExt.php:102
Maintenance & Trust

Remote Media Libraries Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedOct 3, 2018
PHP min version5.4
Downloads52K

Community Trust

Rating78/100
Number of ratings14
Active installs200
Developer Profile

Remote Media Libraries Developer Profile

Louis-Michel Raynauld

1 plugin · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Remote Media Libraries

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/remote-medias-lite/js/admin.min.js/wp-content/plugins/remote-medias-lite/js/admin.js/wp-content/plugins/remote-medias-lite/js/media-remote-ext.min.js/wp-content/plugins/remote-medias-lite/js/media-remote-ext.js/wp-content/plugins/remote-medias-lite/css/media-remote-admin.min.css/wp-content/plugins/remote-medias-lite/css/media-remote-admin.css
Script Paths
/wp-content/plugins/remote-medias-lite/js/admin.min.js/wp-content/plugins/remote-medias-lite/js/media-remote-ext.min.js
Version Parameters
remote-medias-lite/js/admin.min.js?ver=remote-medias-lite/js/media-remote-ext.min.js?ver=remote-medias-lite/css/media-remote-admin.min.css?ver=

HTML / DOM Fingerprints

CSS Classes
remote-media-accountsocs-rml-gallery
HTML Comments
<!-- IMPORTANT: Do not remove this comment. --><!-- OCS RML Activation --><!-- GDrive Media Activation --><!-- Dropbox Media Activation -->+1 more
Data Attributes
data-ocs-rml-gallery-id
JS Globals
ocs_rml_admin_paramswindow.ocs_rml_admin_paramswindow.ocs_rml_media_remote_ext_params
Shortcode Output
[ocs_rml_gallery
FAQ

Frequently Asked Questions about Remote Media Libraries