Ultimate media cleaner Security & Risk Analysis

wordpress.org/plugins/ultimate-media-cleaner

Find used medias from you from the database and/or your upload folder and give the way to delete them the ones "unused"

300 active installs v2.6.1 PHP 7.2+ WP 5.5+ Updated Jun 14, 2022
cleanclean-filesfilesmediamedia-clean
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ultimate media cleaner Safe to Use in 2026?

Generally Safe

Score 85/100

Ultimate media cleaner has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The static analysis of "ultimate-media-cleaner" v2.6.1 reveals a plugin with a generally strong security foundation. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points is a significant positive. Furthermore, all observed SQL queries utilize prepared statements, a crucial practice for preventing SQL injection. The plugin also demonstrates a robust use of capability checks.

However, a critical concern arises from the "Output escaping" signal, indicating that 100% of observed outputs are not properly escaped. This presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data could be injected and executed in the browser. The lack of taint analysis results is either due to the analysis tool's limitations or the plugin's code structure not presenting obvious taint flows, which doesn't negate the XSS risk highlighted by the unescaped output. The absence of any recorded vulnerabilities in its history is a positive trend but does not eliminate the risk of newly discovered or emerging threats.

In conclusion, while the plugin excels in preventing common web vulnerabilities like SQL injection and offers a minimal attack surface, the lack of output escaping is a serious flaw that requires immediate attention. This weakness significantly undermines the plugin's overall security posture and makes it susceptible to XSS attacks. Developers should prioritize implementing proper output escaping mechanisms to mitigate this risk.

Key Concerns

  • Output escaping: 100% not properly escaped
Vulnerabilities
None known

Ultimate media cleaner Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Ultimate media cleaner Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
14 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
17
File Operations
2
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared14 total queries

Output Escaping

0% escaped1 total outputs
Attack Surface

Ultimate media cleaner Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionrest_api_initattachments\attachments.rest.php:22
actionrest_api_initcrawler\crawler.rest.php:15
actionrest_api_initinfo\info.rest.php:14
actionadmin_menumenu\menu.php:4
actionadmin_enqueue_scriptsmenu\menu.php:20
actionrest_api_initoptions\options.rest.php:16
actionrest_api_initpage\page.rest.php:16
actionrest_api_inittranslation\translation.rest.php:9
Maintenance & Trust

Ultimate media cleaner Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedJun 14, 2022
PHP min version7.2
Downloads21K

Community Trust

Rating46/100
Number of ratings3
Active installs300
Developer Profile

Ultimate media cleaner Developer Profile

nicearma

1 plugin · 300 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Ultimate media cleaner

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ultimate-media-cleaner/js/runtime.js/wp-content/plugins/ultimate-media-cleaner/js/polyfills.js/wp-content/plugins/ultimate-media-cleaner/js/styles.css/wp-content/plugins/ultimate-media-cleaner/js/main.js
Script Paths
/wp-content/plugins/ultimate-media-cleaner/js/runtime.js/wp-content/plugins/ultimate-media-cleaner/js/polyfills.js/wp-content/plugins/ultimate-media-cleaner/js/main.js
Version Parameters
ultimate-media-cleaner/js/runtime.js?ver=ultimate-media-cleaner/js/polyfills.js?ver=ultimate-media-cleaner/js/styles.css?ver=ultimate-media-cleaner/js/main.js?ver=

HTML / DOM Fingerprints

Data Attributes
nonce
REST Endpoints
/wp-json/ultimate-media-cleaner/v1/attachments/count//wp-json/ultimate-media-cleaner/v1/attachments/directories/wp-json/ultimate-media-cleaner/v1/attachments/directory/files/wp-json/ultimate-media-cleaner/v1/attachments/directory/file/id/wp-json/ultimate-media-cleaner/v1/attachment/wp-json/ultimate-media-cleaner/v1/attachments/wp-json/ultimate-media-cleaner/v1/attachment/verify/wp-json/ultimate-media-cleaner/v1/attachment/delete/wp-json/ultimate-media-cleaner/v1/attachment/delete/child
Shortcode Output
<umc-root
FAQ

Frequently Asked Questions about Ultimate media cleaner