WP ImageViewer Security & Risk Analysis

wordpress.org/plugins/wp-imageviewer

A zooming and panning plugin inspired by google photos for your web images.

700 active installs v3.0.1 PHP 7.0+ WP 4.1+ Updated Feb 4, 2026
colorboxfancyboximagevieweriv-viewerlightbox
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP ImageViewer Safe to Use in 2026?

Generally Safe

Score 100/100

WP ImageViewer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "wp-imageviewer" v3.0.1 plugin exhibits a strong security posture based on the provided static analysis. There are no identified entry points (AJAX handlers, REST API routes, shortcodes, or cron events) that are exposed without authentication checks. Furthermore, the code demonstrates excellent adherence to secure coding practices, with no dangerous functions used, all SQL queries utilizing prepared statements, and all output being properly escaped. The absence of file operations, external HTTP requests, nonce checks, and capability checks also contributes to a reduced attack surface. The plugin's vulnerability history is clean, with zero known CVEs, which is a positive indicator of its stability and security over time.

While the static analysis and vulnerability history paint a very positive picture, the complete absence of any tested flows in the taint analysis is a slight concern. It's possible that more complex or subtle vulnerabilities might exist that were not detected by the specific static analysis performed. However, given the overall strong code signals and lack of historical vulnerabilities, the risk associated with this plugin appears to be very low. The plugin developers have demonstrated good security practices in the code that was analyzed.

Vulnerabilities
None known

WP ImageViewer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP ImageViewer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

WP ImageViewer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_enqueue_scriptswp-imageviewer.php:55
Maintenance & Trust

WP ImageViewer Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 4, 2026
PHP min version7.0
Downloads11K

Community Trust

Rating98/100
Number of ratings10
Active installs700
Developer Profile

WP ImageViewer Developer Profile

Marcel Pol

18 plugins · 82K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
1119 days
View full developer profile
Detection Fingerprints

How We Detect WP ImageViewer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-imageviewer/imageviewer/iv-viewer.css/wp-content/plugins/wp-imageviewer/imageviewer/iv-viewer.js/wp-content/plugins/wp-imageviewer/wp-imageviewer-init.js
Script Paths
/wp-content/plugins/wp-imageviewer/imageviewer/iv-viewer.js/wp-content/plugins/wp-imageviewer/wp-imageviewer-init.js
Version Parameters
wp-imageviewer/imageviewer/iv-viewer.css?ver=wp-imageviewer/imageviewer/iv-viewer.js?ver=wp-imageviewer/wp-imageviewer-init.js?ver=

HTML / DOM Fingerprints

JS Globals
IVViewer
FAQ

Frequently Asked Questions about WP ImageViewer