
WP-Force Images Download Security & Risk Analysis
wordpress.org/plugins/wp-force-images-downloadForce-download any image (WebP, AVIF, HEIC, PNG, JPEG) with beautiful customizable buttons, live preview, email gate, download tracking, and AJAX down …
Is WP-Force Images Download Safe to Use in 2026?
Generally Safe
Score 99/100WP-Force Images Download has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.
The 'wp-force-images-download' v1.9 plugin exhibits a generally positive security posture based on the static analysis. The plugin effectively utilizes prepared statements for all SQL queries, has a high percentage of properly escaped output, and implements a good number of nonce and capability checks. The limited attack surface, with no unprotected AJAX handlers or REST API routes, is also a strong indicator of good security practices. Taint analysis revealing no unsanitized paths further reinforces this, suggesting a low risk of common injection vulnerabilities.
However, the presence of one known medium-severity vulnerability in its history, specifically related to Cross-Site Scripting (XSS), warrants attention. While currently patched, it indicates a past weakness in output neutralization that could potentially re-emerge if code is modified without careful consideration. The plugin also performs file operations and external HTTP requests, which, while not inherently insecure, represent potential vectors for compromise if not handled with extreme care and proper sanitization, though the static analysis did not flag any specific issues here. The plugin's reliance on a single shortcode as its sole entry point is a strength in terms of attack surface, but it's crucial that this shortcode's implementation is robust against any potential input manipulation.
Overall, 'wp-force-images-download' v1.9 appears to be a relatively secure plugin. Its strengths lie in its proactive use of security measures like prepared statements and output escaping, and its small, protected attack surface. The historical medium-severity XSS vulnerability is a cautionary note, emphasizing the need for ongoing vigilance and thorough code reviews for any future updates. The performance of file operations and external requests should be continuously monitored for any subtle vulnerabilities that might arise.
Key Concerns
- Historical medium severity XSS vulnerability
WP-Force Images Download Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
WP-Force Images Download <= 1.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
WP-Force Images Download Release Timeline
WP-Force Images Download Code Analysis
Output Escaping
Data Flow Analysis
WP-Force Images Download Attack Surface
Shortcodes 1
WordPress Hooks 11
Maintenance & Trust
WP-Force Images Download Maintenance & Trust
Maintenance Signals
Community Trust
WP-Force Images Download Alternatives
Image Download Button
auto-image-download-button
The plugin adds a customizable download button automatically below every image on post, page and different post types.
Button Block – Design Stylish, Interactive, and Multi-Functional Buttons
button-block
Get multi-functional buttons
Lana Downloads Manager
lana-downloads-manager
Downloadable files management system
Quick Download Button
quick-download-button
Add stylish download buttons to any post or page — 7 styles, countdown, popup modal, access control. Gutenberg block and shortcode.
Simple Download Counter
simple-download-counter
Simply counts the number of times your files are downloaded. Display download links and counts using shortcodes.
WP-Force Images Download Developer Profile
2 plugins · 110 total installs
How We Detect WP-Force Images Download
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-force-images-download/style.csswp-force-images-download/style.css?ver=HTML / DOM Fingerprints
wpfid_buttonwpfid_image_size_optionwpfid_iconwpfid_btn_stylenew_name_attrwpfid_field[wpfidwp_fid_short