HUEM: Huge Upload Enabler, mostly Security & Risk Analysis

wordpress.org/plugins/wp-awesome

Allows you to bypass the upload size limitations of the server.

20 active installs v1.0.1 PHP + WP 4.6+ Updated Jan 3, 2017
content-aware-menucontext-menuright-clickupload-limitusability
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is HUEM: Huge Upload Enabler, mostly Safe to Use in 2026?

Generally Safe

Score 85/100

HUEM: Huge Upload Enabler, mostly has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "wp-awesome" v1.0.1 plugin exhibits a generally good security posture with no recorded vulnerabilities in its history. The static analysis reveals a very small attack surface, with zero unprotected entry points such as AJAX handlers, REST API routes, shortcodes, or cron events. This is a positive sign for its security.

However, the code analysis does highlight some areas for improvement. While SQL queries are properly prepared, a significant percentage (55%) of output is not properly escaped, posing a potential cross-site scripting (XSS) risk if user-controlled data is outputted without sanitization. Furthermore, the taint analysis shows three flows with unsanitized paths, which, although not flagged as critical or high severity, warrant investigation to ensure user input is handled securely and does not lead to unintended consequences.

While the lack of known CVEs is encouraging, the presence of unsanitized paths and a high percentage of unescaped output are weaknesses. The plugin's strengths lie in its minimal attack surface and secure SQL handling. The absence of nonces on entry points (though there are no entry points without auth checks) and the presence of file operations without explicit security contexts could be areas to scrutinize further. Overall, it's a relatively low-risk plugin, but the identified output and path sanitization issues require attention to fully secure it.

Key Concerns

  • Unsanitized paths in taint analysis
  • Insufficient output escaping
  • No nonce checks (on 0 entry points)
Vulnerabilities
None known

HUEM: Huge Upload Enabler, mostly Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

HUEM: Huge Upload Enabler, mostly Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
12
10 escaped
Nonce Checks
0
Capability Checks
6
File Operations
11
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

45% escaped22 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

4 flows3 with unsanitized paths
ajax_context_menu (modules\ContextMenus\ContextMenus.php:67)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

HUEM: Huge Upload Enabler, mostly Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

HUEM: Huge Upload Enabler, mostly Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedJan 3, 2017
PHP min version
Downloads3K

Community Trust

Rating60/100
Number of ratings1
Active installs20
Developer Profile

HUEM: Huge Upload Enabler, mostly Developer Profile

frodeborli

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect HUEM: Huge Upload Enabler, mostly

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-awesome/modules/ContextMenus/assets/ContextMenus.js/wp-content/plugins/wp-awesome/modules/ContextMenus/assets/ContextMenus.css
Script Paths
wp-content/plugins/wp-awesome/modules/ContextMenus/assets/ContextMenus.js
Version Parameters
wp-awesome/modules/ContextMenus/assets/ContextMenus.js?ver=wp-awesome/modules/ContextMenus/assets/ContextMenus.css?ver=

HTML / DOM Fingerprints

CSS Classes
postpagepage_itemcurrent-menu-item
Data Attributes
data-wpa-id
JS Globals
settings
REST Endpoints
/wp-json/wp/v2/users/wp-json/wp/v2/media/wp-json/wp/v2/pages/wp-json/wp/v2/posts
FAQ

Frequently Asked Questions about HUEM: Huge Upload Enabler, mostly