Child Theme Wizard Security & Risk Analysis

wordpress.org/plugins/child-theme-wizard

Creates a child theme with one click and lets you customise its options.

10K active installs v1.4 PHP + WP 3.4+ Updated Nov 4, 2022
child-themecreatorgeneratorone-clickstarter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Child Theme Wizard Safe to Use in 2026?

Generally Safe

Score 85/100

Child Theme Wizard has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The child-theme-wizard plugin, version 1.4, exhibits a generally positive security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface, and importantly, all identified entry points appear to be protected. The plugin also demonstrates good practices by using prepared statements for all SQL queries, indicating a reduced risk of SQL injection vulnerabilities.

However, there are areas for concern. A significant portion of output (53%) is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is outputted without adequate sanitization. Additionally, the taint analysis revealed two flows with unsanitized paths. While these are not classified as critical or high severity, the presence of unsanitized paths is a potential risk that could be exploited in combination with other weaknesses or if the plugin's functionality changes. The plugin's history of zero known CVEs is a strong positive, suggesting a well-maintained and secure codebase over time. Overall, the plugin has strengths in its limited attack surface and secure SQL handling, but the unescaped output and unsanitized paths warrant careful attention.

Key Concerns

  • Unsanitized paths in taint analysis
  • Significant portion of output not escaped
Vulnerabilities
None known

Child Theme Wizard Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Child Theme Wizard Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
8 escaped
Nonce Checks
0
Capability Checks
2
File Operations
6
External Requests
0
Bundled Libraries
0

Output Escaping

47% escaped17 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
ctwMainFunction (child-theme-wizard.php:39)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Child Theme Wizard Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menuchild-theme-wizard.php:34
Maintenance & Trust

Child Theme Wizard Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedNov 4, 2022
PHP min version
Downloads161K

Community Trust

Rating98/100
Number of ratings36
Active installs10K
Developer Profile

Child Theme Wizard Developer Profile

Jay Versluis

4 plugins · 10K total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Child Theme Wizard

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/child-theme-wizard/images/guru-header-2013.png
Script Paths
https://apis.google.com/js/platform.js
Version Parameters
child-theme-wizard/style.css?ver=child-theme-wizard/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
wrapicon32errorupdated
Data Attributes
data-channel="wphosting"
JS Globals
gapi
FAQ

Frequently Asked Questions about Child Theme Wizard