Tag Images Security & Risk Analysis

wordpress.org/plugins/tag-images

This plugin adds a panel to the Options screen in the admin that allows you to assign an image to a tag.

20 active installs v1.2 PHP + WP 2.7+ Updated Feb 4, 2010
adminimagestagtags
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Tag Images Safe to Use in 2026?

Generally Safe

Score 85/100

Tag Images has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The 'tag-images' plugin v1.2 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by avoiding dangerous functions, utilizing prepared statements for all SQL queries, and having no recorded CVEs or past vulnerabilities. Furthermore, its attack surface appears minimal with no exposed AJAX handlers, REST API routes, shortcodes, or cron events. This suggests a generally well-developed and secure foundation.

However, significant concerns arise from the static analysis. Notably, 100% of output escaping is not properly handled, posing a risk of cross-site scripting (XSS) vulnerabilities if user-supplied data is rendered directly without sanitization. The taint analysis also reveals two flows with unsanitized paths, which, while not classified as critical or high severity in this analysis, warrant attention as they indicate potential avenues for injecting malicious code or manipulating application behavior. The absence of nonce checks and capability checks further exacerbates these risks, as it implies that even if an entry point were discovered, authentication and authorization might be easily bypassed.

In conclusion, while the plugin benefits from a small attack surface and a clean vulnerability history, the lack of proper output escaping and the presence of unsanitized taint flows are substantial weaknesses. These issues create potential for XSS and other injection-related vulnerabilities. The absence of nonce and capability checks amplifies these risks by reducing the barriers to exploitation. Therefore, immediate attention should be paid to addressing the output escaping and taint flow issues.

Key Concerns

  • No proper output escaping detected
  • Unsanitized paths found in taint analysis
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Tag Images Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Tag Images Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
tagimage_admin (tag-images.php:34)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Tag Images Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menutag-images.php:32
Maintenance & Trust

Tag Images Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedFeb 4, 2010
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Tag Images Developer Profile

chrisnorthwood

5 plugins · 240 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Tag Images

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/tag-images/css/style.css
Script Paths
/wp-content/plugins/tag-images/js/script.js
Version Parameters
tag-images/css/style.css?ver=tag-images/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
wrapform-table
Data Attributes
enctype="multipart/form-data"
FAQ

Frequently Asked Questions about Tag Images