autometa's THUMB Security & Risk Analysis

wordpress.org/plugins/thumb

It reproduces featured images in pages, posts, portfolios or products simply via: [thumb].

10 active installs v2.2 PHP + WP 2.9.0+ Updated Jan 18, 2018
automationfeatured-imagemetadatashortcodethumbnail
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is autometa's THUMB Safe to Use in 2026?

Generally Safe

Score 85/100

autometa's THUMB has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "thumb" plugin v2.2 exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, SQL queries that are 100% prepared, and complete output escaping are excellent indicators of secure coding practices. Furthermore, the lack of file operations and external HTTP requests reduces potential attack vectors significantly. The plugin's vulnerability history is clean, with zero known CVEs, suggesting a history of responsible development and maintenance.

While the static analysis reveals no immediate critical vulnerabilities like unsanitized taint flows or direct SQL injection risks, there are areas for potential concern. The total lack of nonce checks and capability checks, especially with a shortcode present, signifies a potential weakness. If the shortcode handles user-supplied data or performs sensitive actions, the absence of these standard WordPress security measures could open the door to various attacks, including Cross-Site Request Forgery (CSRF) or privilege escalation if not handled carefully within the shortcode's implementation.

In conclusion, "thumb" v2.2 appears to be a well-developed plugin from a secure coding perspective. The core code demonstrates good practices. However, the complete absence of nonce and capability checks on its sole entry point (the shortcode) represents a significant oversight that could lead to vulnerabilities if that entry point is not inherently secured by other means. Future development should prioritize incorporating these standard security checks to further bolster its defenses.

Key Concerns

  • Missing nonce check on shortcode
  • Missing capability check on shortcode
Vulnerabilities
None known

autometa's THUMB Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

autometa's THUMB Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

autometa's THUMB Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[thumb] thumb.php:33
Maintenance & Trust

autometa's THUMB Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJan 18, 2018
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

autometa's THUMB Developer Profile

JorgeAmVF

7 plugins · 90 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect autometa's THUMB

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
autometa
Shortcode Output
<span id="thumb" class="autometa">
FAQ

Frequently Asked Questions about autometa's THUMB