
Current Page Template Viewer Security & Risk Analysis
wordpress.org/plugins/current-page-template-viewerDisplay current template file and directory name on screen for WordPress development.
Is Current Page Template Viewer Safe to Use in 2026?
Generally Safe
Score 100/100Current Page Template Viewer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The security posture of the "current-page-template-viewer" v1.1.0 plugin appears to be generally strong based on the provided static analysis and vulnerability history. The plugin exhibits good practices by not exposing a significant attack surface, with zero AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests are all positive indicators. The high percentage of properly escaped output (92%) and the presence of at least one capability check also contribute to a good security foundation. The lack of any recorded vulnerabilities, including critical or high severity ones, further reinforces this assessment.
However, the analysis does highlight a couple of areas for potential concern. The complete absence of nonce checks across all entry points (which are zero in this case) is noteworthy. While there are no entry points to exploit, if functionality were to be added in the future, the lack of a default nonce implementation could lead to vulnerabilities. Similarly, while the plugin has capability checks, the exact nature and implementation of these checks are not detailed. The taint analysis yielding zero flows is excellent, but it's important to remember that this is based on the current code and may not catch all theoretical issues, especially if the code were to change.
In conclusion, "current-page-template-viewer" v1.1.0 presents a low-risk profile. Its minimal attack surface, secure coding practices regarding SQL and output handling, and clean vulnerability history are commendable. The main area for improvement would be to ensure future development includes standard security practices like nonce checks for any added interactive features. The overall impression is that of a well-maintained and secure plugin for its current functionality.
Key Concerns
- No nonce checks implemented
Current Page Template Viewer Security Vulnerabilities
Current Page Template Viewer Code Analysis
Output Escaping
Current Page Template Viewer Attack Surface
WordPress Hooks 5
Maintenance & Trust
Current Page Template Viewer Maintenance & Trust
Maintenance Signals
Community Trust
Current Page Template Viewer Alternatives
What Template Am I Using
what-template-am-i-using
This plugin is intended for theme developers to use. It shows the current template being used to render the page, current post type, and much more.
Current Template Insights
current-template-insights
Quickly view the active template file and important page information directly in your WordPress admin bar.
Monster Widget
monster-widget
Provides a quick and easy method of adding all core widgets to a sidebar for testing purposes.
What Template
what-template
Adds the current page's template name to the admin bar.
Ray
spatie-ray
Easily debug WordPress sites using Ray.
Current Page Template Viewer Developer Profile
1 plugin · 10 total installs
How We Detect Current Page Template Viewer
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/current-page-template-viewer/js/currpate-popup.jscurrent-page-template-viewer/js/currpate-popup.js?ver=1.1.0HTML / DOM Fingerprints
currpate-template-viewer-wrappercurrpate_script_vars