Smart Watermark Security & Risk Analysis

wordpress.org/plugins/smart-watermark

Plugin allows you to add image watermark to images uploaded to the WordPress Media Library and add watermark to old images via bulk processing tool

60 active installs v3.0.1 PHP + WP 3.2+ Updated Jun 25, 2014
batch-watermarkbulk-watermarkimageimage-watermarkimages
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Smart Watermark Safe to Use in 2026?

Generally Safe

Score 85/100

Smart Watermark has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'smart-watermark' plugin v3.0.1 exhibits a mixed security posture. On the positive side, it demonstrates good practices by using prepared statements for all SQL queries and shows a high rate of output escaping. The absence of known CVEs and a clean vulnerability history suggest a level of past diligence. However, the static analysis reveals a significant concern: the presence of the 'unserialize' function. While the total attack surface appears small and seemingly protected, a single instance of 'unserialize' without explicit sanitization can be a critical entry point for remote code execution if user-supplied data is passed directly to it. The taint analysis, despite a low number of flows, flagged two flows with unsanitized paths, which, combined with the 'unserialize' function, points to a potential risk that needs careful investigation. The plugin also has a moderate number of file operations, which, in conjunction with insecure unserialization, could lead to file system compromises.

Key Concerns

  • Dangerous function unserialize found
  • Flows with unsanitized paths found
Vulnerabilities
None known

Smart Watermark Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Smart Watermark Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
17
67 escaped
Nonce Checks
2
Capability Checks
1
File Operations
10
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$alerts = isset($_SESSION['swl_alerts'])?unserialize($_SESSION['swl_alerts']):array();library\SWL\Alert\Manager.php:35

Output Escaping

80% escaped84 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
updateSetting (library\SWL\Page\Admin\Settings.php:87)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Smart Watermark Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Smart Watermark Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedJun 25, 2014
PHP min version
Downloads10K

Community Trust

Rating86/100
Number of ratings3
Active installs60
Developer Profile

Smart Watermark Developer Profile

belfisher

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Smart Watermark

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/smart-watermark/assets/css/admin/page/page.css/wp-content/plugins/smart-watermark/assets/js/admin/page/page.js
Script Paths
/wp-content/plugins/smart-watermark/library/SWL/Form/Element/Renderer/Color.php/wp-content/plugins/smart-watermark/library/SWL/Page/Admin/Page.php/wp-content/plugins/smart-watermark/library/SWL/Post/Metabox.php

HTML / DOM Fingerprints

CSS Classes
swl-page-page
Data Attributes
data-swl-color-picker
JS Globals
wpColorPicker
FAQ

Frequently Asked Questions about Smart Watermark