WP Crop Stop Security & Risk Analysis

wordpress.org/plugins/wp-crop-stop

Just stop cropping images.

300 active installs v0.1.2 PHP + WP 3.3+ Updated Jan 19, 2019
admincropthemethumbnailthumbnails
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Crop Stop Safe to Use in 2026?

Generally Safe

Score 85/100

WP Crop Stop has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "wp-crop-stop" v0.1.2 plugin demonstrates a generally strong security posture, with no recorded vulnerabilities or known CVEs. The static analysis reveals a clean codebase with no dangerous functions, no direct SQL queries (all use prepared statements), no file operations, and no external HTTP requests. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the taint analysis found no critical or high-severity flows with unsanitized paths.

However, there are a couple of areas for concern that prevent a perfect score. The plugin lacks nonce checks entirely, which is a critical security mechanism for preventing Cross-Site Request Forgery (CSRF) attacks, especially if any administrative functionality were to be added in the future. Additionally, while there are few outputs, a significant portion (33%) are not properly escaped, which could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is ever reflected directly in the output without sanitization. The single capability check is positive, but the overall lack of input validation and protection mechanisms like nonces warrants caution.

Key Concerns

  • Missing nonce checks
  • Unescaped output detected
Vulnerabilities
None known

WP Crop Stop Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Crop Stop Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped3 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<yummi-plugins> (includes\yummi-plugins.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Crop Stop Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initincludes\admin.php:19
filterintermediate_image_sizesincludes\admin.php:51
actionadmin_enqueue_scriptswp-crop-stop.php:27
actionadmin_footerwp-crop-stop.php:36
filterplugin_action_linkswp-crop-stop.php:57
Maintenance & Trust

WP Crop Stop Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedJan 19, 2019
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs300
Developer Profile

WP Crop Stop Developer Profile

EviLex

2 plugins · 310 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Crop Stop

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-crop-stop/includes/css/admin_style.min.css/wp-content/plugins/wp-crop-stop/includes/css/hint.min.css
Script Paths
/wp-content/plugins/wp-crop-stop/includes/yummi-plugins.php

HTML / DOM Fingerprints

CSS Classes
ewm-widget-donate
HTML Comments
<!-- This is magic --><!-- Multiplugin functions -->/* Multiplugin functions *//* /Multiplugin functions */+2 more
Data Attributes
data-guiddata-typeid='ewm-js-api'
JS Globals
EWMwindow.ewmAsyncWidgets
FAQ

Frequently Asked Questions about WP Crop Stop