WP Pic Tagger Security & Risk Analysis

wordpress.org/plugins/wp-pic-tagger

Tag, caption, annotate pictures and images on your Wordpress blog.

20 active installs v0.1 PHP + WP 3.0+ Updated Oct 8, 2010
annotationimagespicturestagging
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Pic Tagger Safe to Use in 2026?

Generally Safe

Score 85/100

WP Pic Tagger has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The wp-pic-tagger plugin, version 0.1, exhibits a mixed security posture. On one hand, the lack of reported CVEs and a relatively small number of SQL queries with a high percentage of prepared statements suggest a generally stable foundation. The absence of external HTTP requests and bundled libraries is also a positive sign, reducing potential attack vectors. However, significant concerns arise from the static code analysis. A critical taint analysis flow with unsanitized paths, coupled with a complete lack of output escaping, presents a substantial risk. This combination implies that user-supplied data could be manipulated and reflected back to the user or browser in an unsafe manner, potentially leading to cross-site scripting (XSS) vulnerabilities. Furthermore, the absence of any capability checks or nonce verification for potential entry points, while the attack surface appears minimal in this analysis, means any future exposure of these points would be unprotected.

Key Concerns

  • Critical taint flow with unsanitized paths
  • 100% of outputs are not properly escaped
  • 0 Nonce checks present
  • 0 Capability checks present
Vulnerabilities
None known

WP Pic Tagger Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Pic Tagger Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
10 prepared
Unescaped Output
17
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

SQL Query Safety

77% prepared13 total queries

Output Escaping

0% escaped17 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<notes> (php\notes.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Pic Tagger Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitwp-pictagger.php:36
actionwp_headwp-pictagger.php:183
filteradmin_footerwp-pictagger.php:244
Maintenance & Trust

WP Pic Tagger Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedOct 8, 2010
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

WP Pic Tagger Developer Profile

Andrew DS a11n

3 plugins · 290 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Pic Tagger

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-pic-tagger/css/style.css/wp-content/plugins/wp-pic-tagger/css/lteIE8.css/wp-content/plugins/wp-pic-tagger/js/jquery-ui-1.8.4.custom.min.js/wp-content/plugins/wp-pic-tagger/js/jquery-notes_1.0.8.js/wp-content/plugins/wp-pic-tagger/js/jquery.autocomplete.js
Script Paths
http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js/wp-content/plugins/wp-pic-tagger/js/jquery-ui-1.8.4.custom.min.js/wp-content/plugins/wp-pic-tagger/js/jquery-notes_1.0.8.js/wp-content/plugins/wp-pic-tagger/js/jquery.autocomplete.js

HTML / DOM Fingerprints

CSS Classes
wp-tag-objects-wp-tag-people-
HTML Comments
<!--[if lte IE 8]><![endif]-->//<![CDATA[//]]>
Data Attributes
jQueryNotes
JS Globals
jQueryNotesshiftAuthoredit_insert_buttonwp_people_handlerwp_objects_handler
FAQ

Frequently Asked Questions about WP Pic Tagger