WP Attachment Download Security & Risk Analysis

wordpress.org/plugins/wp-attachment-download

Plugin adds functionality to download posts attachments build with ACF file fields from administration.

10 active installs v1.0.1 PHP 5.6+ WP 3.0.1+ Updated Unknown
attachmentsdownloadsmediazip
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Attachment Download Safe to Use in 2026?

Generally Safe

Score 100/100

WP Attachment Download has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "wp-attachment-download" plugin, in version 1.0.1, exhibits a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for SQL queries and has no recorded vulnerability history (CVEs). The code signals indicate a single nonce check and a single capability check, which are foundational security measures. However, significant concerns arise from its attack surface. With two AJAX handlers, both of which are unprotected by authentication checks, there's a high potential for unauthorized access and execution of plugin functionalities. While no critical or high severity taint flows were identified, the presence of one flow with unsanitized paths, even if not explicitly labeled as critical, warrants attention as it could lead to unexpected behavior or vulnerabilities depending on the context. The output escaping is also a weakness, with less than half of outputs being properly escaped, increasing the risk of cross-site scripting (XSS) vulnerabilities.

In conclusion, while the plugin avoids common pitfalls like raw SQL queries and a history of known vulnerabilities, the lack of authentication on its AJAX endpoints and the prevalence of unescaped output present notable security risks. The single taint flow with unsanitized paths, although not categorized as critical, adds to the potential for unforeseen issues. Developers should prioritize securing the AJAX endpoints and improving output sanitization to mitigate these risks.

Key Concerns

  • AJAX handlers without auth checks
  • Unescaped output (44% proper)
  • Flow with unsanitized paths
Vulnerabilities
None known

WP Attachment Download Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Attachment Download Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
12 escaped
Nonce Checks
1
Capability Checks
1
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

44% escaped27 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
print_plugin_admin_notices (admin\class-wp-attachment-download-admin.php:289)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

WP Attachment Download Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_download_attachmentsincludes\class-wp-attachment-download.php:159
authwp_ajax_regenerate_previewincludes\class-wp-attachment-download.php:162
WordPress Hooks 9
actionplugins_loadedincludes\class-wp-attachment-download.php:133
actionadmin_enqueue_scriptsincludes\class-wp-attachment-download.php:147
actionadmin_enqueue_scriptsincludes\class-wp-attachment-download.php:148
actionadmin_menuincludes\class-wp-attachment-download.php:151
actionadmin_post_download_attachmentsincludes\class-wp-attachment-download.php:158
actionadmin_noticesincludes\class-wp-attachment-download.php:165
filterattachment_file_nameincludes\class-wp-attachment-download.php:168
filterzip_file_nameincludes\class-wp-attachment-download.php:169
filtercreated_byincludes\class-wp-attachment-download.php:170
Maintenance & Trust

WP Attachment Download Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedUnknown
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Attachment Download Developer Profile

Tomas Rybnicky

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Attachment Download

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-attachment-download/admin/css/wp-attachment-download-admin.min.css/wp-content/plugins/wp-attachment-download/admin/js/wp-attachment-download-admin.min.js
Script Paths
/wp-content/plugins/wp-attachment-download/admin/js/wp-attachment-download-admin.min.js
Version Parameters
wp-attachment-download/admin/css/wp-attachment-download-admin.min.css?ver=wp-attachment-download/admin/js/wp-attachment-download-admin.min.js?ver=

HTML / DOM Fingerprints

JS Globals
params
FAQ

Frequently Asked Questions about WP Attachment Download