Setup Default Featured Image Security & Risk Analysis

wordpress.org/plugins/setup-default-feature-image

Setup default featured image in wordpress post, page, custom post type all where.

300 active installs v1.3 PHP 5.6+ WP 5.2+ Updated Dec 29, 2025
image
99
A · Safe
CVEs total1
Unpatched0
Last CVEJan 14, 2025
Download
Safety Verdict

Is Setup Default Featured Image Safe to Use in 2026?

Generally Safe

Score 99/100

Setup Default Featured Image has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Jan 14, 2025Updated 3mo ago
Risk Assessment

The "setup-default-feature-image" plugin v1.3 exhibits a generally positive security posture, demonstrating good practices in several key areas. The static analysis indicates a lack of dangerous functions and file operations, and importantly, all detected SQL queries are properly prepared. Furthermore, the plugin implements nonce and capability checks for all its AJAX entry points, which are crucial for preventing common web vulnerabilities. The taint analysis also revealed no vulnerabilities, suggesting that data processed by the plugin is handled safely.

However, a significant concern arises from the vulnerability history, which lists a total of one known CVE. While currently unpatched vulnerabilities are zero, the presence of a past medium-severity vulnerability and a history of "Missing Authorization" issues is noteworthy. This pattern suggests that while the current version might be clean, there's a recurring tendency for authorization flaws to be introduced or discovered in this plugin. The code analysis does highlight a low percentage of properly escaped output, which, while not leading to immediate critical risks given the other safeguards, represents a potential area for improvement to further harden the plugin against cross-site scripting (XSS) vulnerabilities.

In conclusion, the plugin is well-defended against common code execution and injection attacks due to its use of prepared statements and robust authorization checks on its entry points. The lack of critical taint flows is reassuring. Nevertheless, the historical pattern of vulnerabilities, particularly those related to authorization, and the suboptimal output escaping warrant attention. Users should remain vigilant and ensure they are always using the latest patched versions, as past issues indicate a potential for recurring weaknesses.

Key Concerns

  • Past medium severity vulnerability
  • Common vulnerability type: Missing Authorization
  • Low percentage of properly escaped output
Vulnerabilities
1

Setup Default Featured Image Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-24642medium · 5.3Missing Authorization

Setup Default Featured Image <= 1.2 - Missing Authorization

Jan 14, 2025 Patched in 1.3 (43d)
Code Analysis
Analyzed Mar 16, 2026

Setup Default Featured Image Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
20
6 escaped
Nonce Checks
4
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

23% escaped26 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
WDFI_register_settings (includes\WDFI_Admin.php:182)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Setup Default Featured Image Attack Surface

Entry Points4
Unprotected0

AJAX Handlers 4

authwp_ajax_wdfi_addnewrule_get_taxonmyincludes\WDFI_Admin.php:14
noprivwp_ajax_wdfi_addnewrule_get_taxonmyincludes\WDFI_Admin.php:15
authwp_ajax_wdfi_addnewrule_save_taxonmyincludes\WDFI_Admin.php:17
noprivwp_ajax_wdfi_addnewrule_save_taxonmyincludes\WDFI_Admin.php:18
WordPress Hooks 6
actionadmin_enqueue_scriptsincludes\WDFI_Admin.php:10
actionadmin_initincludes\WDFI_Admin.php:11
actionadmin_menuincludes\WDFI_Admin.php:12
actioninitincludes\WDFI_Cron.php:8
filterget_post_metadataincludes\WDFI_Frontend.php:8
filterpost_thumbnail_htmlincludes\WDFI_Frontend.php:9
Maintenance & Trust

Setup Default Featured Image Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 29, 2025
PHP min version5.6
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs300
Developer Profile

Setup Default Featured Image Developer Profile

theme funda

26 plugins · 12K total installs

87
trust score
Avg Security Score
98/100
Avg Patch Time
85 days
View full developer profile
Detection Fingerprints

How We Detect Setup Default Featured Image

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/setup-default-feature-image/css/style.css/wp-content/plugins/setup-default-feature-image/js/script.js
Script Paths
/wp-content/plugins/setup-default-feature-image/js/script.js
Version Parameters
setup-default-feature-image/css/style.css?ver=setup-default-feature-image/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
wdfi_addnewrule_get_taxonmymaileshcisla_labelmaileshcisla
Data Attributes
data-wdfi_nonce
JS Globals
WDFIselect2
REST Endpoints
/wp-json/wdfi/v1/some_endpoint
FAQ

Frequently Asked Questions about Setup Default Featured Image