Core Checksum Verifier Security & Risk Analysis

wordpress.org/plugins/core-checksum-verifier

Verifies the integrity of your WordPress core files with official checksums. Displays modified/missing files.

0 active installs v1.0.1 PHP 7.4+ WP 5.0+ Updated Unknown
checksumintegritysecuritywordpress-core
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Core Checksum Verifier Safe to Use in 2026?

Generally Safe

Score 100/100

Core Checksum Verifier has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'core-checksum-verifier' plugin v1.0.1 exhibits a mixed security posture. On the positive side, the code demonstrates good practices by exclusively using prepared statements for SQL queries and ensuring all outputs are properly escaped. It also avoids dangerous functions and file operations, and has no recorded vulnerability history, which suggests a history of secure development.

However, a significant concern arises from its attack surface. The plugin exposes one AJAX handler that lacks any authentication or capability checks. This means any unauthenticated user could potentially interact with this endpoint, posing a risk if the functionality it exposes is sensitive or can be misused. While taint analysis shows no vulnerabilities, the absence of checks on the AJAX handler is a known entry point for common web attacks.

In conclusion, while the plugin's core code appears to be written with security in mind regarding data handling, the lack of authentication on its AJAX endpoint is a critical oversight. This single unprotected entry point significantly elevates the risk profile, outweighing the otherwise positive code quality signals. Addressing this unprotected AJAX handler should be the immediate priority.

Key Concerns

  • Unprotected AJAX handler
Vulnerabilities
None known

Core Checksum Verifier Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Core Checksum Verifier Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped6 total outputs
Attack Surface
1 unprotected

Core Checksum Verifier Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_verify_wp_checksumcore-checksum-verifier.php:86
WordPress Hooks 2
actionadmin_menucore-checksum-verifier.php:21
actionadmin_enqueue_scriptscore-checksum-verifier.php:32
Maintenance & Trust

Core Checksum Verifier Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedUnknown
PHP min version7.4
Downloads269

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Core Checksum Verifier Developer Profile

kamranmayo

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Core Checksum Verifier

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/core-checksum-verifier/assets/css/admin.css/wp-content/plugins/core-checksum-verifier/assets/js/admin.js/wp-content/plugins/core-checksum-verifier/assets/img/9068699.png/wp-content/plugins/core-checksum-verifier/assets/img/header.png
Script Paths
/wp-content/plugins/core-checksum-verifier/assets/js/admin.js
Version Parameters
core-checksum-verifier/assets/css/admin.css?ver=core-checksum-verifier/assets/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
pul-buttonpul-overlay__bodypul-dialog__headerpul-dialog__bannerpul-dialog__banner-innerpul-dialog__header-innerpul-dialog__header-bodypul-dialog__header-content+4 more
JS Globals
corechDatajQuery
REST Endpoints
/wp-json/core-checksum-verifier/v1/settings
FAQ

Frequently Asked Questions about Core Checksum Verifier