Unique File Security & Risk Analysis

wordpress.org/plugins/unique-file

Only store one when the uploaded file is same.

0 active installs v1.0.0 PHP + WP 4.0+ Updated Mar 23, 2022
filemd5mediarenameunique
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Unique File Safe to Use in 2026?

Generally Safe

Score 85/100

Unique File has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The 'unique-file' plugin v1.0.0, based on the static analysis, presents a generally positive initial security posture. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events, particularly those without proper authentication or permission checks, significantly limits the plugin's attack surface. Furthermore, the plugin avoids dangerous functions and external HTTP requests, and all observed SQL queries utilize prepared statements, indicating good coding practices in these areas.

However, the analysis does flag a significant concern regarding output escaping. With one observed output and none being properly escaped, there is a high risk of cross-site scripting (XSS) vulnerabilities if the plugin handles user-supplied data that is later displayed to other users. While the taint analysis found no unsanitized paths, the lack of output escaping represents a critical oversight that could be exploited even without complex taint flows.

The plugin's vulnerability history is clean, with no recorded CVEs. This, combined with the limited attack surface and adherence to prepared statements, suggests a potentially well-maintained or simple plugin. Nevertheless, the lack of output escaping is a serious weakness that overrides the otherwise positive findings. A balanced conclusion would be that while the plugin has a minimal attack surface and avoids common pitfalls like raw SQL, the critical failure in output escaping makes it vulnerable to XSS attacks.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

Unique File Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Unique File Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
unique_file_setting_page (unique-file.php:107)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Unique File Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filterwp_handle_upload_prefilterunique-file.php:35
filterwp_unique_filenameunique-file.php:48
filterupload_dirunique-file.php:67
filterpre_delete_attachmentunique-file.php:86
filterplugin_action_linksunique-file.php:97
actionadmin_menuunique-file.php:104
Maintenance & Trust

Unique File Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedMar 23, 2022
PHP min version
Downloads796

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Unique File Developer Profile

rise0chen

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Unique File

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="rename_md5"name="must_one"name="without_siteid"name="disable_yearmonth"name="prevent_deletion"name="type" value="unique_file_set"
FAQ

Frequently Asked Questions about Unique File