Resize Image After Upload Security & Risk Analysis

wordpress.org/plugins/resize-image-after-upload

Automatically resize your images after uploading using this plugin. Specify height&width, the plugin will do the rest quickly and transparently.

80K active installs v1.8.6 PHP 5.6+ WP 3.5+ Updated Dec 10, 2025
bulk-rescalebulk-resizedownsizerescaleresize
99
A · Safe
CVEs total1
Unpatched0
Last CVEAug 8, 2022
Safety Verdict

Is Resize Image After Upload Safe to Use in 2026?

Generally Safe

Score 99/100

Resize Image After Upload has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Aug 8, 2022Updated 3mo ago
Risk Assessment

The 'resize-image-after-upload' plugin version 1.8.6 presents a mixed security posture. On the positive side, the static analysis reveals a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed. Furthermore, all SQL queries are properly prepared, and there are no external HTTP requests or bundled libraries to worry about. The presence of nonce and capability checks, albeit limited, is a good practice.

However, concerns arise from the output escaping, where only 36% of outputs are properly escaped. This suggests a potential for Cross-Site Scripting (XSS) vulnerabilities if user-controlled data is not adequately sanitized before being displayed. The taint analysis also shows one flow with an unsanitized path, indicating a possible information disclosure or other security risk, though it's not rated as critical or high severity. The plugin's vulnerability history, with one past high-severity CVE related to CSRF, further emphasizes the need for careful review of its security implementation. While the current version appears to have no unpatched vulnerabilities, the historical pattern of a high-severity issue warrants caution.

In conclusion, while the plugin has made strides in reducing its attack surface and employing secure database practices, the insufficient output escaping and the presence of an unsanitized path in the taint analysis are significant weaknesses. The past CSRF vulnerability, though patched, highlights a historical tendency that requires ongoing vigilance. Users should be aware of the potential for XSS and other data handling issues. It's crucial for developers to address the output escaping and taint flow concerns to improve the overall security of this plugin.

Key Concerns

  • Unsanitized path in taint analysis
  • Low percentage of properly escaped output
  • Past high severity vulnerability (CSRF)
Vulnerabilities
1

Resize Image After Upload Security Vulnerabilities

CVEs by Year

1 CVE in 2022
2022
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

WF-0ce2786e-2918-4dc0-99c4-db447216e140-resize-image-after-uploadhigh · 8.8Cross-Site Request Forgery (CSRF)

Resize Image After Upload <= 1.8.5 - Cross-Site Request Forgery

Aug 8, 2022 Patched in 1.8.6 (533d)
Code Analysis
Analyzed Mar 16, 2026

Resize Image After Upload Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
4 escaped
Nonce Checks
1
Capability Checks
1
File Operations
5
External Requests
0
Bundled Libraries
0

Output Escaping

36% escaped11 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
<resize-image-after-upload> (resize-image-after-upload.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Resize Image After Upload Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuresize-image-after-upload.php:48
actionwp_handle_uploadresize-image-after-upload.php:51
Maintenance & Trust

Resize Image After Upload Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 10, 2025
PHP min version5.6
Downloads660K

Community Trust

Rating96/100
Number of ratings56
Active installs80K
Developer Profile

Resize Image After Upload Developer Profile

ShortPixel

8 plugins · 1.2M total installs

77
trust score
Avg Security Score
97/100
Avg Patch Time
239 days
View full developer profile
Detection Fingerprints

How We Detect Resize Image After Upload

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/resize-image-after-upload/js/dismiss_notices.js
Script Paths
/wp-content/plugins/resize-image-after-upload/js/dismiss_notices.js
Version Parameters
resize-image-after-upload/js/dismiss_notices.js?ver=resize-image-after-upload/css/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
resizeimage-button
HTML Comments
<!-- Plugin Name: Resize Image After Upload --><!-- Plugin URI: https://wordpress.org/plugins/resize-image-after-upload/ --><!-- Description: Automatically resize uploaded images to within specified maximum width and height. Also has option to force recompression of JPEGs. Configuration options found under <a href="options-general.php?page=resize-after-upload">Settings > Resize Image Upload</a> --><!-- Author: ShortPixel -->+1 more
Data Attributes
jr_options_updatejr_resizeupload_widthjr_resizeupload_heightjr_resizeupload_qualityjr_resizeupload_resize_yesnojr_resizeupload_recompress_yesno+10 more
JS Globals
jrResizeuploadDismissNewsjr_settings_page
FAQ

Frequently Asked Questions about Resize Image After Upload