widget upload Security & Risk Analysis

wordpress.org/plugins/widget-upload

your regiter users can upload the file you choose.

10 active installs v1.5.1 PHP + WP + Updated Feb 28, 2009
registeruploaduserwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is widget upload Safe to Use in 2026?

Generally Safe

Score 85/100

widget upload has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The "widget-upload" plugin version 1.5.1 presents a mixed security picture. On the positive side, the static analysis reveals no identified CVEs, no critical or high severity taint flows, and no direct SQL injection risks due to the exclusive use of prepared statements. Furthermore, there are no external HTTP requests, meaning no opportunities for SSRF vulnerabilities originating from this plugin. The absence of cron events and shortcodes also limits the potential attack surface.

However, significant concerns arise from the code signals. The most prominent issue is that 100% of the 14 identified output points are not properly escaped. This is a critical vulnerability that could lead to Cross-Site Scripting (XSS) attacks, allowing attackers to inject malicious scripts into the user's browser. Additionally, the complete lack of nonce checks and capability checks on any potential entry points, though the static analysis shows zero entry points, suggests a potential blind spot. If any entry points were to be introduced in future versions or by other means, they would likely be unprotected.

In conclusion, while the plugin has a clean vulnerability history and avoids common pitfalls like raw SQL or external requests, the pervasive issue of unescaped output represents a high-risk area. The lack of security checks on potential entry points, even if currently zero, is also a weakness that warrants attention. The plugin's strengths lie in its avoidance of direct database compromise and external dependencies, but the severe risk of XSS due to unescaped output cannot be overstated.

Key Concerns

  • Unescaped output on all identified points
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

widget upload Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

widget upload Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

widget upload Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped14 total outputs
Attack Surface

widget upload Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initwidget_upload.php:158
Maintenance & Trust

widget upload Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedFeb 28, 2009
PHP min version
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

widget upload Developer Profile

jessai

5 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect widget upload

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="fileupload"id="upfile_0"name="envoyer"name="upload_title"id="upload_title"name="upload_autorise"+7 more
FAQ

Frequently Asked Questions about widget upload