WP Extra File Types Security & Risk Analysis

wordpress.org/plugins/wp-extra-file-types

Plugin to let you extend the list of allowed file types supported by the Wordpress Media Library

50K active installs v0.5.2 PHP + WP 4.0+ Updated Oct 28, 2023
file-typemedia-libraryupload
84
B · Generally Safe
CVEs total1
Unpatched0
Last CVEDec 27, 2021
Safety Verdict

Is WP Extra File Types Safe to Use in 2026?

Mostly Safe

Score 84/100

WP Extra File Types is generally safe to use though it hasn't been updated recently. 1 past CVE were resolved. Keep it updated.

1 known CVELast CVE: Dec 27, 2021Updated 2yr ago
Risk Assessment

The 'wp-extra-file-types' plugin v0.5.2 exhibits a generally good security posture, with no critical or high severity taint flows identified and a high percentage of properly escaped output. The absence of a large attack surface, including unprotected AJAX handlers, REST API routes, shortcodes, and cron events, is a significant strength. Furthermore, all SQL queries are protected by prepared statements and nonce and capability checks are present, indicating adherence to some fundamental security practices.

However, the presence of the 'unserialize' dangerous function is a notable concern. While no specific vulnerabilities arising from its use are immediately evident in the static analysis or taint flows, 'unserialize' is inherently risky if not handled with extreme caution and strict input validation. The plugin's vulnerability history, particularly a past high severity CSRF vulnerability, suggests a potential for security oversights. Although the known CVE is patched, this historical context warrants vigilance and suggests that the plugin may have had weaknesses in the past that could resurface if not carefully maintained.

In conclusion, 'wp-extra-file-types' v0.5.2 appears to be reasonably secure for a plugin of its size and complexity, with strengths in its limited attack surface and data handling practices. The primary weakness lies in the use of 'unserialize' and the historical context of a high severity vulnerability. Continued monitoring and secure coding practices are recommended, especially concerning the handling of serialized data.

Key Concerns

  • Use of dangerous function 'unserialize'
  • Past high severity vulnerability (CSRF)
Vulnerabilities
1

WP Extra File Types Security Vulnerabilities

CVEs by Year

1 CVE in 2021
2021
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

CVE-2021-24936high · 8.8Cross-Site Request Forgery (CSRF)

WP Extra File Types <= 0.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting

Dec 27, 2021 Patched in 0.5.1 (757d)
Code Analysis
Analyzed Mar 16, 2026

WP Extra File Types Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
3
47 escaped
Nonce Checks
1
Capability Checks
1
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$this->types_list = @unserialize($wpeft_list);wp-extra-file-types.php:37

Output Escaping

94% escaped50 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
admin_page (wp-extra-file-types.php:135)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Extra File Types Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_initwp-extra-file-types.php:126
actioninitwp-extra-file-types.php:487
actionadmin_menuwp-extra-file-types.php:489
filterupload_mimeswp-extra-file-types.php:490
filterwp_check_filetype_and_extwp-extra-file-types.php:492
filtergform_disallowed_file_extensionswp-extra-file-types.php:494
Maintenance & Trust

WP Extra File Types Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedOct 28, 2023
PHP min version
Downloads346K

Community Trust

Rating68/100
Number of ratings39
Active installs50K
Developer Profile

WP Extra File Types Developer Profile

davide.airaghi

4 plugins · 51K total installs

69
trust score
Avg Security Score
85/100
Avg Patch Time
757 days
View full developer profile
Detection Fingerprints

How We Detect WP Extra File Types

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-extra-file-types/languages.php/wp-content/plugins/wp-extra-file-types/mime-list.txt

HTML / DOM Fingerprints

CSS Classes
in_wpnot_in_wp
HTML Comments
<!-- WP Extra File Types | settings -->
Data Attributes
name="ext[]"name="custom_d[]"name="custom_e[]"name="custom_m[]"name="no_strict"name="no_wp"+1 more
JS Globals
wpeft_form
FAQ

Frequently Asked Questions about WP Extra File Types