WP-Stateless – Google Cloud Storage Security & Risk Analysis

wordpress.org/plugins/wp-stateless

Upload and serve your WordPress media files from Google Cloud Storage.

4K active installs v4.4.1 PHP 8.1+ WP 5.0+ Updated Jan 16, 2026
backupcdngoogle-cloudgoogle-cloud-storageuploads
98
A · Safe
CVEs total2
Unpatched0
Last CVEApr 5, 2024
Safety Verdict

Is WP-Stateless – Google Cloud Storage Safe to Use in 2026?

Generally Safe

Score 98/100

WP-Stateless – Google Cloud Storage has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Apr 5, 2024Updated 2mo ago
Risk Assessment

The "wp-stateless" plugin v4.4.1 presents a mixed security posture. On one hand, the static analysis reveals a commendably small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, there are no critical or high-severity taint flows detected, and dangerous functions are absent. This indicates a generally well-structured codebase with an emphasis on limiting direct entry points. However, several areas raise significant concerns. The plugin exhibits a very low rate of proper output escaping (5%), suggesting a high probability of Cross-Site Scripting (XSS) vulnerabilities. While taint analysis shows no unsanitized paths, the lack of output escaping is a critical weakness that can easily be exploited. The plugin's vulnerability history, including a high-severity vulnerability from April 2024 and a medium one, coupled with common vulnerability types like Missing Authorization and XSS, reinforces these concerns. The absence of nonce checks and capability checks on its entry points (though currently zero) is also a potential future risk if the attack surface were to expand without proper security measures. The presence of bundled libraries like Guzzle and Select2 also warrants attention, as outdated versions of these can introduce vulnerabilities.

Key Concerns

  • Low rate of proper output escaping (5%)
  • High-severity vulnerability in history (2024-04-05)
  • Medium-severity vulnerability in history
  • Common vulnerability type: Missing Authorization
  • Common vulnerability type: Cross-site Scripting
  • No nonce checks
  • No capability checks
  • Bundled libraries (Guzzle, Select2) may be outdated
Vulnerabilities
2

WP-Stateless – Google Cloud Storage Security Vulnerabilities

CVEs by Year

1 CVE in 2022
2022
1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

High
1
Medium
1

2 total CVEs

CVE-2024-1385high · 7.1Missing Authorization

WP-Stateless – Google Cloud Storage <= 3.4.0 - Missing Authorization to Limited Arbitrary Options Update

Apr 5, 2024 Patched in 3.4.1 (1d)
CVE-2022-4905medium · 6.5Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

WP-Stateless – Google Cloud Storage <= 3.1.1 - Authenticated (Admin+) Stored Cross-Site Scripting

May 6, 2022 Patched in 3.2.0 (643d)
Code Analysis
Analyzed Mar 16, 2026

WP-Stateless – Google Cloud Storage Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
14 prepared
Unescaped Output
54
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
2

Bundled Libraries

GuzzleSelect2

SQL Query Safety

88% prepared16 total queries

Output Escaping

5% escaped57 total outputs
Attack Surface

WP-Stateless – Google Cloud Storage Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_noticeswp-stateless-media.php:113
Maintenance & Trust

WP-Stateless – Google Cloud Storage Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 16, 2026
PHP min version8.1
Downloads452K

Community Trust

Rating78/100
Number of ratings51
Active installs4K
Developer Profile

WP-Stateless – Google Cloud Storage Developer Profile

UDX Usability Dynamics

15 plugins · 5K total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
322 days
View full developer profile
Detection Fingerprints

How We Detect WP-Stateless – Google Cloud Storage

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-stateless/static/css/dashboard.css/wp-content/plugins/wp-stateless/static/js/dashboard.js/wp-content/plugins/wp-stateless/static/js/notice.js/wp-content/plugins/wp-stateless/static/js/scripts.js
Version Parameters
wp-stateless/static/css/dashboard.css?ver=wp-stateless/static/js/dashboard.js?ver=wp-stateless/static/js/notice.js?ver=wp-stateless/static/js/scripts.js?ver=

HTML / DOM Fingerprints

CSS Classes
stateless-media-notice
HTML Comments
<!-- wp-stateless: admin notices -->
Data Attributes
data-stateless-media
JS Globals
stateless_media_noticewpCloud
REST Endpoints
/wp-json/stateless-media/v1/utilities/upload
FAQ

Frequently Asked Questions about WP-Stateless – Google Cloud Storage