
WP Extra File Types Security & Risk Analysis
wordpress.org/plugins/wp-extra-file-typesPlugin to let you extend the list of allowed file types supported by the Wordpress Media Library
Is WP Extra File Types Safe to Use in 2026?
Mostly Safe
Score 84/100WP Extra File Types is generally safe to use though it hasn't been updated recently. 1 past CVE were resolved. Keep it updated.
The 'wp-extra-file-types' plugin v0.5.2 exhibits a generally good security posture, with no critical or high severity taint flows identified and a high percentage of properly escaped output. The absence of a large attack surface, including unprotected AJAX handlers, REST API routes, shortcodes, and cron events, is a significant strength. Furthermore, all SQL queries are protected by prepared statements and nonce and capability checks are present, indicating adherence to some fundamental security practices.
However, the presence of the 'unserialize' dangerous function is a notable concern. While no specific vulnerabilities arising from its use are immediately evident in the static analysis or taint flows, 'unserialize' is inherently risky if not handled with extreme caution and strict input validation. The plugin's vulnerability history, particularly a past high severity CSRF vulnerability, suggests a potential for security oversights. Although the known CVE is patched, this historical context warrants vigilance and suggests that the plugin may have had weaknesses in the past that could resurface if not carefully maintained.
In conclusion, 'wp-extra-file-types' v0.5.2 appears to be reasonably secure for a plugin of its size and complexity, with strengths in its limited attack surface and data handling practices. The primary weakness lies in the use of 'unserialize' and the historical context of a high severity vulnerability. Continued monitoring and secure coding practices are recommended, especially concerning the handling of serialized data.
Key Concerns
- Use of dangerous function 'unserialize'
- Past high severity vulnerability (CSRF)
WP Extra File Types Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
WP Extra File Types <= 0.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting
WP Extra File Types Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
WP Extra File Types Attack Surface
WordPress Hooks 6
Maintenance & Trust
WP Extra File Types Maintenance & Trust
Maintenance Signals
Community Trust
WP Extra File Types Alternatives
Mime Types Plus
mime-types-plus
Add the mime type that can be used in the media library to each file type.
Smart Auto Upload Images – Import External Images
smart-auto-upload-images
Import external images automatically on save. Adds to media library and updates URLs. No manual downloads. Works with any post type.
Overwrite Uploads
overwrite-uploads
Overwrites files with the same name and folder when uploading, instead of storing multiple copies with unique filenames.
Physical Custom Upload Folder for Real Media Library
physical-custom-upload-folder
Upload files in your media library to a custom folder structure on your file system created with Real Media Library folders.
WPArtisan Filename Sanitizer
wpartisan-filename-sanitizer
Sanitize media filenames to remove non-latin special characters and accents
WP Extra File Types Developer Profile
4 plugins · 51K total installs
How We Detect WP Extra File Types
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-extra-file-types/languages.php/wp-content/plugins/wp-extra-file-types/mime-list.txtHTML / DOM Fingerprints
in_wpnot_in_wp<!-- WP Extra File Types | settings -->name="ext[]"name="custom_d[]"name="custom_e[]"name="custom_m[]"name="no_strict"name="no_wp"+1 morewpeft_form