Used Media Identifier Security & Risk Analysis

wordpress.org/plugins/used-media-identifier

Here is a short description of the plugin. This should be no more than 150 characters. No markup here.

10 active installs v1.0.0 PHP + WP 4.0+ Updated Sep 6, 2017
iconimagemanagementmediaused-images
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Used Media Identifier Safe to Use in 2026?

Generally Safe

Score 85/100

Used Media Identifier has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'used-media-identifier' v1.0.0 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by having no known vulnerabilities (CVEs) and zero identified dangerous functions. The absence of external HTTP requests and the use of prepared statements for all SQL queries are also significant strengths, indicating a conscious effort to avoid common web attack vectors. However, several areas raise concerns. The limited attack surface is notable, but the complete lack of nonce and capability checks across any entry points is a significant weakness, leaving potential avenues for exploitation if any such points were to be introduced or discovered later. Furthermore, the low percentage of properly escaped output (48%) suggests a risk of Cross-Site Scripting (XSS) vulnerabilities, particularly if user-supplied data is involved in these unescaped outputs. The taint analysis revealing flows with unsanitized paths, although not classified as critical or high severity, warrants attention as it points to potential issues with handling file paths. The vulnerability history, while currently clean, could be misleading if the plugin has not been extensively tested or if this is its first release, and therefore its long-term security track record is unproven.

Overall, while the plugin appears to have a solid foundation by avoiding known dangerous practices like raw SQL and external requests, the lack of input validation and output escaping is a notable risk. The unsanitized paths in the taint analysis, coupled with the low output escaping rate, are the most concrete technical risks identified. The complete absence of nonces and capability checks presents a structural weakness that could become critical if the plugin evolves or if new entry points are added without proper security considerations. Given the current state, the primary risks revolve around potential XSS and file manipulation vulnerabilities stemming from inadequate sanitization and escaping.

Key Concerns

  • Low proper output escaping rate (48%)
  • Taint analysis: Unsantized paths found
  • No nonce checks on any entry points
  • No capability checks on any entry points
Vulnerabilities
None known

Used Media Identifier Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Used Media Identifier Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
37
34 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

48% escaped71 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

4 flows2 with unsanitized paths
new_wp_print_media_templates (admin\class-used-media-identifier-admin.php:156)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Used Media Identifier Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionadmin_footeradmin\class-used-media-identifier-admin.php:107
actionwp_footeradmin\class-used-media-identifier-admin.php:108
actioncustomize_controls_print_footer_scriptsadmin\class-used-media-identifier-admin.php:109
filterwp_prepare_attachment_for_jsadmin\class-used-media-identifier-admin.php:110
actionpost-plupload-upload-uiadmin\class-used-media-identifier-admin.php:237
actionplugins_loadedincludes\class-used-media-identifier.php:147
actionadmin_menuincludes\class-used-media-identifier.php:162
actionadmin_enqueue_scriptsincludes\class-used-media-identifier.php:166
actionadmin_enqueue_scriptsincludes\class-used-media-identifier.php:167
actionadmin_initincludes\class-used-media-identifier.php:168
actionpost_updatedincludes\class-used-media-identifier.php:169
actionwp_enqueue_scriptsincludes\class-used-media-identifier.php:184
actionwp_enqueue_scriptsincludes\class-used-media-identifier.php:185
Maintenance & Trust

Used Media Identifier Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedSep 6, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Used Media Identifier Developer Profile

Anil Parmar

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Used Media Identifier

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/used-media-identifier/css/used-media-identifier-admin.css/wp-content/plugins/used-media-identifier/js/used-media-identifier-admin.js
Script Paths
/wp-content/plugins/used-media-identifier/js/used-media-identifier-admin.js
Version Parameters
used-media-identifier-admin.css?ver=used-media-identifier-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
media-modal
Data Attributes
is_badgedateymd
JS Globals
window.used_media_identifier_admin
FAQ

Frequently Asked Questions about Used Media Identifier