Customize Twenty Seventeen Security & Risk Analysis

wordpress.org/plugins/customize-twenty-seventeen

Customize Twenty Seventeen theme - add Google Fonts, use new templates and get other options to easily customize your site.

2K active installs v1.0.5 PHP + WP 4.5+ Updated Mar 10, 2022
changecustomizemastermodifytwentyseventeen
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Customize Twenty Seventeen Safe to Use in 2026?

Generally Safe

Score 85/100

Customize Twenty Seventeen has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "customize-twenty-seventeen" v1.0.5 plugin exhibits a mixed security posture. On the positive side, there are no known CVEs, a complete lack of SQL injection vulnerabilities due to prepared statements, and no file operations or external HTTP requests, which significantly reduces the attack surface. The absence of any recorded vulnerabilities in its history is also a strong indicator of good security practices. However, the static analysis reveals some concerning areas. The presence of the `unserialize` function, without any clear context on its usage or input sanitization, is a significant risk, as unserialization of untrusted data can lead to remote code execution. Furthermore, the low percentage of properly escaped output (10%) suggests a potential for Cross-Site Scripting (XSS) vulnerabilities, especially if user-supplied data is being outputted without sufficient sanitization. The complete absence of capability checks and nonce checks across all entry points, while currently showing zero unprotected entry points, is a structural weakness that could become a significant vulnerability if new entry points are introduced or if existing ones are not properly secured in future versions. The lack of taint analysis results also makes it difficult to fully assess the risk associated with the `unserialize` function.

Key Concerns

  • Unescaped output detected
  • Dangerous function 'unserialize' detected
  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

Customize Twenty Seventeen Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Customize Twenty Seventeen Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
9
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$fonts = unserialize( stripslashes( 'a:809:{i:0;a:2:{s:8:"css-name";s:7:"ABeeZee";s:9:"font-name";s:web_fonts.php:3

Output Escaping

10% escaped10 total outputs
Attack Surface

Customize Twenty Seventeen Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 19
actionwp_enqueue_scriptsbt_customize_2017.php:29
filterbody_classbt_customize_2017.php:58
actioncustomize_registerbt_customize_2017.php:75
actioncustomize_registerbt_customize_2017.php:96
actioncustomize_registerbt_customize_2017.php:117
actioncustomize_registerbt_customize_2017.php:138
actioncustomize_registerbt_customize_2017.php:159
actioncustomize_registerbt_customize_2017.php:182
actioncustomize_registerbt_customize_2017.php:204
actioncustomize_registerbt_customize_2017.php:226
actioncustomize_registerbt_customize_2017.php:245
actioncustomize_registerbt_customize_2017.php:264
actionwp_headbt_customize_2017.php:292
actionwp_enqueue_scriptsbt_customize_2017.php:327
filterpage_attributes_dropdown_pages_argsbt_customize_2017.php:364
filterpage_attributes_dropdown_pages_argsbt_customize_2017.php:372
filtertheme_page_templatesbt_customize_2017.php:377
filtertemplate_includebt_customize_2017.php:384
actionplugins_loadedbt_customize_2017.php:480
Maintenance & Trust

Customize Twenty Seventeen Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedMar 10, 2022
PHP min version
Downloads41K

Community Trust

Rating84/100
Number of ratings10
Active installs2K
Developer Profile

Customize Twenty Seventeen Developer Profile

boldthemes

8 plugins · 69K total installs

68
trust score
Avg Security Score
84/100
Avg Patch Time
118 days
View full developer profile
Detection Fingerprints

How We Detect Customize Twenty Seventeen

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/customize-twenty-seventeen/style.css/wp-content/plugins/customize-twenty-seventeen/script.js
Script Paths
/wp-content/plugins/customize-twenty-seventeen/script.js
Version Parameters
customize-twenty-seventeen/style.css?ver=customize-twenty-seventeen/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
bt-remove-entry-headerbt-remove-home-fullscreenbt-menu-leftbt-menu-centerbt-menu-right
FAQ

Frequently Asked Questions about Customize Twenty Seventeen