
WP Tesseract Security & Risk Analysis
wordpress.org/plugins/wp-tesseractA plugin for extracting text from attached images using OCR via Tesseract.
Is WP Tesseract Safe to Use in 2026?
Use With Caution
Score 63/100WP Tesseract has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The wp-tesseract v1.0.2 plugin presents a mixed security posture. On the positive side, its static analysis shows no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in zero identified entry points and no unprotected ones. Furthermore, all SQL queries appear to be properly prepared, mitigating a common class of vulnerabilities. The absence of external HTTP requests also reduces the risk of server-side request forgery or infection from compromised external resources.
However, significant concerns arise from several code signals. The presence of the 'exec' function is a critical red flag, as it can be exploited for remote code execution if improperly handled. Compounding this, 100% of output escaping is missing, meaning any data processed and displayed by the plugin is vulnerable to Cross-Site Scripting (XSS) attacks. The plugin also performs file operations without clear indication of their security context or sanitization.
The vulnerability history, particularly the existence of one unpatched medium severity CVE related to XSS, reinforces the output escaping concerns. The fact that this vulnerability is recent and unpatched is a major risk. While the attack surface seems limited in terms of direct entry points, the combination of a dangerous function ('exec'), lack of output escaping, and an existing XSS vulnerability, which is a common vulnerability type for this plugin, indicates a substantial risk of compromise.
Key Concerns
- Unpatched CVE
- Dangerous function: exec
- Output escaping: 0% properly escaped
- Missing Nonce checks
- Missing Capability checks
WP Tesseract Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
WP Tesseract <= 1.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting
WP Tesseract Code Analysis
Dangerous Functions Found
Output Escaping
WP Tesseract Attack Surface
WordPress Hooks 8
Maintenance & Trust
WP Tesseract Maintenance & Trust
Maintenance Signals
Community Trust
WP Tesseract Alternatives
Image Sizes Panel
image-sizes-panel
Display a meta box when viewing a media item in the admin that display all generated images sizes.
Auto Delete Unattached Media
auto-delete-unattached-media
Automatically delete unattached/unused media/images/attachments every minute silently in the background.
AIR Download Attachments
air-download-attachments
The AIR Download Attachments plugin adds a "Download All Attachments" button to posts, allowing users to download all attached images as a z …
Image Copyright Manager
image-copyright-manager
Add copyright information to WordPress media files with a custom field and display them using shortcodes. Now includes JSON-LD for Image SEO.
Move Images Between Pages
move-images-between-pages
This plugin allows you to quickly reattach images to different pages in your WordPress installation.
WP Tesseract Developer Profile
1 plugin · 50 total installs
How We Detect WP Tesseract
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-tesseract/css/wp-tesseract-admin.css/wp-content/plugins/wp-tesseract/js/wp-tesseract-admin.js/wp-content/plugins/wp-tesseract/js/wp-tesseract-admin.jswp-tesseract/css/wp-tesseract-admin.css?ver=wp-tesseract/js/wp-tesseract-admin.js?ver=HTML / DOM Fingerprints
window.jquery