Upload Files by Default When Inserting Media Security & Risk Analysis

wordpress.org/plugins/upload-files-by-default-when-inserting-media

Makes the Upload Files tab active rather than the Media Library Tab when adding images or other media to a page or post. Useful if you do not often re …

90 active installs v1.0.0 PHP + WP 3.9.0+ Updated Jun 23, 2025
addchangedefaultimagemedia
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Upload Files by Default When Inserting Media Safe to Use in 2026?

Generally Safe

Score 100/100

Upload Files by Default When Inserting Media has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9mo ago
Risk Assessment

The "upload-files-by-default-when-inserting-media" plugin v1.0.0 exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, or vulnerability history suggests that the developers have followed good security practices. The plugin also demonstrates a minimal attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events without proper authentication or permission checks. This lack of exploitable entry points is a significant strength.

While the static analysis reveals a clean codebase with no identified vulnerabilities or potential risks within its code signals and taint analysis, it's important to note that the analysis also reported zero nonces checks and zero capability checks. Although there are no attack vectors identified that would immediately exploit this, in a more complex plugin or a different set of circumstances, the absence of these checks could become a concern if new entry points were introduced in future versions. The complete lack of historical vulnerabilities further reinforces the perception of a well-secured plugin. Overall, this plugin appears to be very secure in its current state, but the lack of critical security features like nonces and capability checks, even in the absence of current exploitation vectors, prevents a perfect score.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Upload Files by Default When Inserting Media Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Upload Files by Default When Inserting Media Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Upload Files by Default When Inserting Media Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterplugin_row_metaupload-files-by-default-when-inserting-media.php:34
actionadmin_footer-post-new.phpupload-files-by-default-when-inserting-media.php:72
actionadmin_footer-post.phpupload-files-by-default-when-inserting-media.php:73
Maintenance & Trust

Upload Files by Default When Inserting Media Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJun 23, 2025
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs90
Developer Profile

Upload Files by Default When Inserting Media Developer Profile

cubecolour

17 plugins · 21K total installs

99
trust score
Avg Security Score
99/100
Avg Patch Time
7 days
View full developer profile
Detection Fingerprints

How We Detect Upload Files by Default When Inserting Media

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
wp.media.controller.Library.prototype.defaults.contentUserSetting
FAQ

Frequently Asked Questions about Upload Files by Default When Inserting Media