Child Themify Security & Risk Analysis

wordpress.org/plugins/child-themify

Create child themes with the click of a button.

7K active installs v2.0.1 PHP + WP 4.7.0+ Updated Jan 30, 2018
childthemethemes
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Child Themify Safe to Use in 2026?

Generally Safe

Score 85/100

Child Themify has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The child-themify plugin v2.0.1 exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The absence of known CVEs, critical taint flows, dangerous functions, and SQL injection vulnerabilities using prepared statements are positive indicators. Furthermore, the limited attack surface, with all entry points having permission callbacks and the presence of capability checks, suggests good security practices in place for handling user interactions and administrative functions.

However, a significant concern arises from the output escaping analysis, where 100% of the outputs are not properly escaped. This presents a high risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website. While the plugin has no recorded vulnerability history, this single weakness in output handling can be exploited to compromise the security of the site and its users. The presence of file operations, while not inherently insecure, warrants careful review in conjunction with the unescaped output to ensure no sensitive files are inadvertently exposed or manipulated.

In conclusion, while the plugin demonstrates strengths in preventing common vulnerabilities like SQL injection and controlling its attack surface, the lack of output escaping is a critical flaw that needs immediate attention. The plugin's clean vulnerability history is commendable, but it does not negate the current high risk introduced by the unescaped output. Addressing this output escaping issue should be the top priority to mitigate the risk of XSS attacks.

Key Concerns

  • 100% of outputs not properly escaped
Vulnerabilities
None known

Child Themify Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Child Themify Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Child Themify Attack Surface

Entry Points2
Unprotected0

REST API Routes 2

GET/wp-json/child-themify/v1theme-data/(?P<theme>.+)includes\api.php:16
GET/wp-json/child-themify/v1create-themeincludes\api.php:26
WordPress Hooks 2
actionplugins_loadedchild-themify.php:28
actionrest_api_initincludes\api.php:7
Maintenance & Trust

Child Themify Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedJan 30, 2018
PHP min version
Downloads246K

Community Trust

Rating84/100
Number of ratings42
Active installs7K
Developer Profile

Child Themify Developer Profile

J B

2 plugins · 7K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Child Themify

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/child-themify/assets/css/child-themify-admin.css
Script Paths
/wp-content/plugins/child-themify/assets/js/child-themify-admin.js
Version Parameters
child-themify/assets/css/child-themify-admin.css?ver=child-themify/assets/js/child-themify-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
ctfAppRoot
Data Attributes
data-resturldata-noncedata-themesdata-current-userdata-i18n
JS Globals
ChildThemify
REST Endpoints
/wp-json/child-themify/v1/theme-data//wp-json/child-themify/v1/create-theme
FAQ

Frequently Asked Questions about Child Themify