Upload Multiple Image Security & Risk Analysis

wordpress.org/plugins/upload-multiple-image

This plugin adds a meta box for multiple images for all posts and pages.

10 active installs v1.0 PHP + WP 3.7+ Updated Feb 12, 2014
imagemetaboxmultimultiple-uploadupload-image
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Upload Multiple Image Safe to Use in 2026?

Generally Safe

Score 85/100

Upload Multiple Image has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "upload-multiple-image" plugin v1.0 exhibits a mixed security posture. On the positive side, there are no known vulnerabilities (CVEs) associated with this plugin, and the code analysis reveals a lack of direct SQL injection risks due to the exclusive use of prepared statements. Furthermore, the plugin demonstrates awareness of security best practices by including nonce and capability checks, albeit these are not comprehensive across all potential entry points. However, significant concerns arise from the presence of the `unserialize` function, which, without proper sanitization and validation of the serialized data, can lead to remote code execution vulnerabilities. The fact that none of the outputs are properly escaped is also a serious deficiency, opening the door to Cross-Site Scripting (XSS) attacks. The absence of any taint analysis flows could be due to limited data or an inability of the analysis tool to effectively trace potentially vulnerable functions, which doesn't negate the risk posed by `unserialize`.

Key Concerns

  • Use of unserialize function
  • Output escaping is not properly implemented
Vulnerabilities
None known

Upload Multiple Image Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Upload Multiple Image Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$images = unserialize($value);upload-multi-image.php:114
unserialize$images = unserialize($value);upload-multi-image.php:143

Output Escaping

0% escaped2 total outputs
Attack Surface

Upload Multiple Image Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionload-post.phpupload-multi-image.php:14
actionload-post-new.phpupload-multi-image.php:15
actionadd_meta_boxesupload-multi-image.php:32
actionsave_postupload-multi-image.php:33
actionadmin_enqueue_scriptsupload-multi-image.php:34
Maintenance & Trust

Upload Multiple Image Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedFeb 12, 2014
PHP min version
Downloads3K

Community Trust

Rating94/100
Number of ratings3
Active installs10
Developer Profile

Upload Multiple Image Developer Profile

suhasrathod

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Upload Multiple Image

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/upload-multiple-image/js/sr_image_upload_script.js
Script Paths
/wp-content/plugins/upload-multiple-image/js/sr_image_upload_script.js
Version Parameters
sr_image_upload_script?ver=

HTML / DOM Fingerprints

CSS Classes
sr_multi_images
Data Attributes
id="sr_multi_images"name="sr_multi_images"id="sr_multi_upload_nonce"
JS Globals
totalItemsplugin_dir
FAQ

Frequently Asked Questions about Upload Multiple Image