WP Imsizer Security & Risk Analysis

wordpress.org/plugins/wp-imsizer

Auto resize/convert image uploads to set height/width or file type. Auto set image alt, title tags, limit file size and disable 2560px limit.

200 active installs v1.2.10 PHP + WP 5.4+ Updated Jan 5, 2026
image-file-limitimage-resizepng-convertresize-imageseo
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Imsizer Safe to Use in 2026?

Generally Safe

Score 100/100

WP Imsizer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The wp-imsizer plugin v1.2.10 exhibits a strong security posture in several key areas. The absence of known CVEs, unpatched vulnerabilities, and common vulnerability types in its history suggests a relatively well-maintained and secure codebase. Static analysis further reinforces this, showing no critical or high-severity taint flows, no dangerous functions, and a complete reliance on prepared statements for SQL queries. Additionally, the presence of nonce and capability checks, albeit only once each, indicates an awareness of WordPress security best practices.

However, a significant concern arises from the low percentage of properly escaped output (17%). With 12 total outputs analyzed, this leaves a substantial number of potential injection vectors for cross-site scripting (XSS) vulnerabilities, especially given the lack of specific detail on where these outputs occur. While the attack surface is reported as zero for AJAX, REST API, shortcodes, and cron events, this could be due to the static analysis not identifying these entry points, or the plugin genuinely having no such features. Given the unescaped output issue, a thorough review of the plugin's output handling mechanisms is highly recommended to mitigate potential XSS risks.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

WP Imsizer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Imsizer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
2 escaped
Nonce Checks
1
Capability Checks
1
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

17% escaped12 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
wp_imsizer_options (wp-imsizer.php:167)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Imsizer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initwp-imsizer.php:74
actionadmin_menuwp-imsizer.php:126
actionwp_handle_uploadwp-imsizer.php:129
filterbig_image_size_thresholdwp-imsizer.php:139
actionadd_attachmentwp-imsizer.php:482
Maintenance & Trust

WP Imsizer Maintenance & Trust

Maintenance Signals

WordPress version tested6.10
Last updatedJan 5, 2026
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings2
Active installs200
Developer Profile

WP Imsizer Developer Profile

Manny Rodrigues

4 plugins · 5K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
368 days
View full developer profile
Detection Fingerprints

How We Detect WP Imsizer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Imsizer