
HUEM: Huge Upload Enabler, mostly Security & Risk Analysis
wordpress.org/plugins/wp-awesomeAllows you to bypass the upload size limitations of the server.
Is HUEM: Huge Upload Enabler, mostly Safe to Use in 2026?
Generally Safe
Score 85/100HUEM: Huge Upload Enabler, mostly has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wp-awesome" v1.0.1 plugin exhibits a generally good security posture with no recorded vulnerabilities in its history. The static analysis reveals a very small attack surface, with zero unprotected entry points such as AJAX handlers, REST API routes, shortcodes, or cron events. This is a positive sign for its security.
However, the code analysis does highlight some areas for improvement. While SQL queries are properly prepared, a significant percentage (55%) of output is not properly escaped, posing a potential cross-site scripting (XSS) risk if user-controlled data is outputted without sanitization. Furthermore, the taint analysis shows three flows with unsanitized paths, which, although not flagged as critical or high severity, warrant investigation to ensure user input is handled securely and does not lead to unintended consequences.
While the lack of known CVEs is encouraging, the presence of unsanitized paths and a high percentage of unescaped output are weaknesses. The plugin's strengths lie in its minimal attack surface and secure SQL handling. The absence of nonces on entry points (though there are no entry points without auth checks) and the presence of file operations without explicit security contexts could be areas to scrutinize further. Overall, it's a relatively low-risk plugin, but the identified output and path sanitization issues require attention to fully secure it.
Key Concerns
- Unsanitized paths in taint analysis
- Insufficient output escaping
- No nonce checks (on 0 entry points)
HUEM: Huge Upload Enabler, mostly Security Vulnerabilities
HUEM: Huge Upload Enabler, mostly Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
HUEM: Huge Upload Enabler, mostly Attack Surface
Maintenance & Trust
HUEM: Huge Upload Enabler, mostly Maintenance & Trust
Maintenance Signals
Community Trust
HUEM: Huge Upload Enabler, mostly Alternatives
Custom right click menu
custom-right-click-menu
Custom right click menu plugin enables you to create a context menu instead of blocking right click for copyright and other issues.
Right Click Menu Builder – Custom Context Menu Maker
super-custom-right-click-menu
Build a fully customizable WordPress right-click menu. Replace default browser menus with a custom context menu using a drag-and-drop builder.
Big File Uploads – Increase Maximum File Upload Size
tuxedo-big-file-uploads
Enable large file uploads in the built-in WordPress media uploader via file chunking, and set maximum upload file size to any value based on user role …
WP Content Copy Protection & No Right Click
wp-content-copy-protector
This WP plugin protects posts from being copied (content copy protection). Keep your content safe from unauthorized distribution!
EasyMedia – Increase Media Upload File Size | Role-Based Upload Limit | Increase Execution Time
wp-maximum-upload-file-size
EasyMedia - Increase the maximum upload file size limit to any value. Increase upload limit - upload large files effortlessly.
HUEM: Huge Upload Enabler, mostly Developer Profile
1 plugin · 20 total installs
How We Detect HUEM: Huge Upload Enabler, mostly
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-awesome/modules/ContextMenus/assets/ContextMenus.js/wp-content/plugins/wp-awesome/modules/ContextMenus/assets/ContextMenus.csswp-content/plugins/wp-awesome/modules/ContextMenus/assets/ContextMenus.jswp-awesome/modules/ContextMenus/assets/ContextMenus.js?ver=wp-awesome/modules/ContextMenus/assets/ContextMenus.css?ver=HTML / DOM Fingerprints
postpagepage_itemcurrent-menu-itemdata-wpa-idsettings/wp-json/wp/v2/users/wp-json/wp/v2/media/wp-json/wp/v2/pages/wp-json/wp/v2/posts