WP Easy Tools Compression Security & Risk Analysis

wordpress.org/plugins/wp-easy-tools-compression

dietIMAGE uses smart lossy compression techniques to reduce the file size of your PNG files. By selectively decreasing the number of colours in the im …

10 active installs v1.0 PHP + WP 3.0.1+ Updated Jan 9, 2014
compress-csscompress-htmlcompress-image-filecompress-javascriptcompressed-jpeg
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WP Easy Tools Compression Safe to Use in 2026?

Generally Safe

Score 85/100

WP Easy Tools Compression has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "wp-easy-tools-compression" plugin v1.0 exhibits a concerning security posture due to significant vulnerabilities in its attack surface and code handling. While it correctly utilizes prepared statements for SQL queries and avoids dangerous functions, these strengths are overshadowed by critical weaknesses. The plugin exposes two AJAX handlers without any authentication or capability checks, creating a substantial entry point for potential unauthorized actions. Furthermore, the taint analysis revealed two flows with unsanitized paths, which, although not classified as critical or high severity in this analysis, represent a latent risk that could be exploited if combined with other factors or if the analysis depth was insufficient.

The lack of nonce checks on AJAX handlers is a particularly worrying sign, as this is a fundamental WordPress security mechanism designed to prevent Cross-Site Request Forgery (CSRF) attacks. Coupled with the absence of capability checks, attackers could potentially trigger these AJAX actions without proper authorization, leading to unintended consequences. The very low percentage of properly escaped output (6%) also indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the site. The plugin's history of zero known CVEs is positive, but given the current code analysis findings, this may reflect a lack of thorough external auditing rather than inherent security. In conclusion, while the plugin demonstrates good practices in database interaction, its handling of user input and authentication for its entry points is severely lacking, presenting a significant risk to WordPress installations.

Key Concerns

  • AJAX handlers without auth checks
  • AJAX handlers without nonce checks
  • Capability checks are missing
  • Low output escaping percentage
  • Unsanitized paths in taint flows
Vulnerabilities
None known

WP Easy Tools Compression Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Easy Tools Compression Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
16
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
19
External Requests
3
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

6% escaped17 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
compress_single_image (ajax\wtc_ajax_admin.php:262)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

WP Easy Tools Compression Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_wtc_ajax_adminwp-easy-tools.php:63
noprivwp_ajax_wtc_ajax_adminwp-easy-tools.php:64
WordPress Hooks 7
filterwp_generate_attachment_metadatamodels\wtc_media.php:2
filtermanage_media_columnsmodels\wtc_media.php:79
actionmanage_media_custom_columnmodels\wtc_media.php:80
actiondelete_attachmentmodels\wtc_media.php:113
actionadmin_menuwp-easy-tools.php:18
actionadmin_enqueue_scriptswp-easy-tools.php:53
filterstylesheet_uriwp-easy-tools.php:103
Maintenance & Trust

WP Easy Tools Compression Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedJan 9, 2014
PHP min version
Downloads2K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

WP Easy Tools Compression Developer Profile

bastikikang

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Easy Tools Compression

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-easy-tools-compression/assets/css/wtc_admin.css/wp-content/plugins/wp-easy-tools-compression/assets/js/wtc_admin.js
Script Paths
/wp-content/plugins/wp-easy-tools-compression/assets/js/wtc_admin.js
Version Parameters
wp-easy-tools-compression/assets/js/wtc_admin.js?ver=1.0

HTML / DOM Fingerprints

CSS Classes
wtc_media_restorewtc_media
Data Attributes
idrev
FAQ

Frequently Asked Questions about WP Easy Tools Compression