Replace Image Security & Risk Analysis

wordpress.org/plugins/replace-image

Upload a new version of an image without deleting the old image attachment, so that references to the image remain intact.

9K active installs v1.1.11 PHP + WP 3.5+ Updated Aug 12, 2024
imageimagesmediaoverwritereplace
91
A · Safe
CVEs total1
Unpatched0
Last CVEJun 18, 2024
Download
Safety Verdict

Is Replace Image Safe to Use in 2026?

Generally Safe

Score 91/100

Replace Image has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Jun 18, 2024Updated 1yr ago
Risk Assessment

The "replace-image" plugin v1.1.11 exhibits a mixed security posture. On the positive side, the code demonstrates good practices regarding SQL queries, all of which are properly prepared, and all output is correctly escaped. It also includes a reasonable number of capability checks (3) and a nonce check, suggesting some awareness of security principles. However, a significant concern arises from the attack surface analysis, which reveals one AJAX handler that lacks authentication checks. This presents a direct avenue for potential abuse by unauthenticated users. Furthermore, the plugin has a history of a past medium-severity vulnerability related to Authorization Bypass Through User-Controlled Key, which was recently patched. While the current version has no unpatched CVEs, this past vulnerability type indicates a recurring area of concern that warrants careful monitoring.

While the taint analysis shows no critical or high-severity flows and the code signals indicate no dangerous functions, the single unprotected AJAX endpoint is a notable weakness. This unprotected entry point could be leveraged to trigger unintended actions or expose sensitive information if not properly secured within the handler itself. The presence of file operations without further context also raises a mild flag, though their security is not explicitly detailed. In conclusion, the plugin has made strides in core secure coding practices, but the unprotected AJAX handler remains a critical area of risk that needs immediate attention. The history of authorization bypass vulnerabilities, even if patched, suggests a pattern that requires continued vigilance.

Key Concerns

  • Unprotected AJAX handler found
  • Past medium CVE for Authorization Bypass
Vulnerabilities
1

Replace Image Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-4873medium · 4.3Authorization Bypass Through User-Controlled Key

Replace Image <= 1.1.10 - Insecure Direct Object Reference

Jun 18, 2024 Patched in 1.1.11 (31d)
Code Analysis
Analyzed Mar 16, 2026

Replace Image Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
14 escaped
Nonce Checks
1
Capability Checks
3
File Operations
4
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped14 total outputs
Attack Surface
1 unprotected

Replace Image Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_hm_replace_image_rd_notice_hidehm-replace-image.php:221
WordPress Hooks 8
actionadmin_menuhm-replace-image.php:37
actionadmin_enqueue_scriptshm-replace-image.php:74
actionedit_attachmenthm-replace-image.php:79
filterattachment_fields_to_edithm-replace-image.php:155
filterwp_calculate_image_srcsethm-replace-image.php:175
filterwp_get_attachment_image_srchm-replace-image.php:186
filterwp_prepare_attachment_for_jshm-replace-image.php:194
actionadmin_noticeshm-replace-image.php:220
Maintenance & Trust

Replace Image Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedAug 12, 2024
PHP min version
Downloads120K

Community Trust

Rating92/100
Number of ratings65
Active installs9K
Developer Profile

Replace Image Developer Profile

WP Zone

21 plugins · 40K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
124 days
View full developer profile
Detection Fingerprints

How We Detect Replace Image

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/replace-image/images/disable-cache-chrome.png/wp-content/plugins/replace-image/images/disable-cache-firefox.png
Script Paths
/wp-content/plugins/replace-image/js/hm-replace-image.js
Version Parameters
hm-replace-imageWPZ_REPLACE_IMAGE_VERSION

HTML / DOM Fingerprints

Data Attributes
hm_image_replacehm_image_replace_with_fld
FAQ

Frequently Asked Questions about Replace Image