
Replace Image Security & Risk Analysis
wordpress.org/plugins/replace-imageUpload a new version of an image without deleting the old image attachment, so that references to the image remain intact.
Is Replace Image Safe to Use in 2026?
Generally Safe
Score 91/100Replace Image has a strong security track record. Known vulnerabilities have been patched promptly.
The "replace-image" plugin v1.1.11 exhibits a mixed security posture. On the positive side, the code demonstrates good practices regarding SQL queries, all of which are properly prepared, and all output is correctly escaped. It also includes a reasonable number of capability checks (3) and a nonce check, suggesting some awareness of security principles. However, a significant concern arises from the attack surface analysis, which reveals one AJAX handler that lacks authentication checks. This presents a direct avenue for potential abuse by unauthenticated users. Furthermore, the plugin has a history of a past medium-severity vulnerability related to Authorization Bypass Through User-Controlled Key, which was recently patched. While the current version has no unpatched CVEs, this past vulnerability type indicates a recurring area of concern that warrants careful monitoring.
While the taint analysis shows no critical or high-severity flows and the code signals indicate no dangerous functions, the single unprotected AJAX endpoint is a notable weakness. This unprotected entry point could be leveraged to trigger unintended actions or expose sensitive information if not properly secured within the handler itself. The presence of file operations without further context also raises a mild flag, though their security is not explicitly detailed. In conclusion, the plugin has made strides in core secure coding practices, but the unprotected AJAX handler remains a critical area of risk that needs immediate attention. The history of authorization bypass vulnerabilities, even if patched, suggests a pattern that requires continued vigilance.
Key Concerns
- Unprotected AJAX handler found
- Past medium CVE for Authorization Bypass
Replace Image Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Replace Image <= 1.1.10 - Insecure Direct Object Reference
Replace Image Code Analysis
Output Escaping
Replace Image Attack Surface
AJAX Handlers 1
WordPress Hooks 8
Maintenance & Trust
Replace Image Maintenance & Trust
Maintenance Signals
Community Trust
Replace Image Alternatives
Replace & Rename Media Files
replace-rename-media
Replace existing media files, rename media files, and display file sizes in the WordPress media library.
Enable Media Replace
enable-media-replace
Easily replace any attached image/file by simply uploading a new file in the Media Library edit view - a real time saver!
Instant Images – One-click Image Uploads from Unsplash, Openverse, Pixabay, Pexels, and Giphy
instant-images
One-click uploads from Unsplash, Openverse, Pixabay, Pexels, and Giphy directly to your WordPress media library.
Media Cleaner: Clean your WordPress!
media-cleaner
Clean your WordPress! Eliminate unused and broken media files. For a faster, and better website.
Media Library Assistant
media-library-assistant
Enhances the Media Library; powerful gallery and list shortcodes, full taxonomy support, IPTC/EXIF/XMP/PDF processing, bulk/quick edit.
Replace Image Developer Profile
21 plugins · 40K total installs
How We Detect Replace Image
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/replace-image/images/disable-cache-chrome.png/wp-content/plugins/replace-image/images/disable-cache-firefox.png/wp-content/plugins/replace-image/js/hm-replace-image.jshm-replace-imageWPZ_REPLACE_IMAGE_VERSIONHTML / DOM Fingerprints
hm_image_replacehm_image_replace_with_fld