Customize Twenty Sixteen Security & Risk Analysis

wordpress.org/plugins/customize-twenty-sixteen

Customize Twenty Sixteen theme - add Google Fonts, use new templates without sidebar and get other options to easily customize your site.

500 active installs v1.0.2 PHP + WP 4.5+ Updated Mar 10, 2022
changecustomizemastermodifytwentysixteen
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Customize Twenty Sixteen Safe to Use in 2026?

Generally Safe

Score 85/100

Customize Twenty Sixteen has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The plugin "customize-twenty-sixteen" v1.0.2 exhibits a mixed security posture. On one hand, the plugin demonstrates good practices by avoiding SQL injection vulnerabilities with 100% prepared statements and has no recorded vulnerability history, suggesting a generally secure development approach. The attack surface is also minimal with no apparent entry points like AJAX handlers, REST API routes, or shortcodes without authentication checks.

However, there are significant concerns. The presence of the `unserialize` function is a critical risk. Without proper sanitization and validation of the data being unserialized, this function can be exploited to execute arbitrary code, leading to remote code execution (RCE) vulnerabilities. Additionally, the extremely low rate of properly escaped output (9%) indicates a high risk of cross-site scripting (XSS) vulnerabilities across many of its outputs. The lack of nonce and capability checks, while seemingly mitigated by the zero attack surface, still represent a potential weakness if new entry points are introduced or if the current structure is bypassed.

Given the absence of known CVEs, the plugin appears to be relatively clean historically. However, the identified code signals, particularly `unserialize` and widespread unescaped output, point to significant, exploitable flaws within the current version. The strength lies in the lack of entry points and prepared SQL statements, but the weaknesses are severe and could be exploited.

Key Concerns

  • Use of unserialize function
  • Low percentage of properly escaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Customize Twenty Sixteen Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Customize Twenty Sixteen Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
10
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$fonts = unserialize( stripslashes( 'a:809:{i:0;a:2:{s:8:"css-name";s:7:"ABeeZee";s:9:"font-name";s:web_fonts.php:3

Output Escaping

9% escaped11 total outputs
Attack Surface

Customize Twenty Sixteen Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 23
actionwp_enqueue_scriptsbt_customize_2016.php:29
filterbody_classbt_customize_2016.php:58
actioncustomize_registerbt_customize_2016.php:75
actioncustomize_registerbt_customize_2016.php:96
actioncustomize_registerbt_customize_2016.php:117
actioncustomize_registerbt_customize_2016.php:138
actioncustomize_registerbt_customize_2016.php:159
actioncustomize_registerbt_customize_2016.php:181
actioncustomize_registerbt_customize_2016.php:203
actioncustomize_registerbt_customize_2016.php:225
actioncustomize_registerbt_customize_2016.php:247
actioncustomize_registerbt_customize_2016.php:266
actioncustomize_registerbt_customize_2016.php:285
actionwp_headbt_customize_2016.php:357
actionwp_enqueue_scriptsbt_customize_2016.php:392
filterpost_thumbnail_sizebt_customize_2016.php:405
filtertwentysixteen_custom_header_argsbt_customize_2016.php:418
actiontwentysixteen_creditsbt_customize_2016.php:424
filterpage_attributes_dropdown_pages_argsbt_customize_2016.php:460
filterpage_attributes_dropdown_pages_argsbt_customize_2016.php:468
filtertheme_page_templatesbt_customize_2016.php:473
filtertemplate_includebt_customize_2016.php:480
actionplugins_loadedbt_customize_2016.php:576
Maintenance & Trust

Customize Twenty Sixteen Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedMar 10, 2022
PHP min version
Downloads10K

Community Trust

Rating80/100
Number of ratings3
Active installs500
Developer Profile

Customize Twenty Sixteen Developer Profile

boldthemes

8 plugins · 69K total installs

68
trust score
Avg Security Score
84/100
Avg Patch Time
118 days
View full developer profile
Detection Fingerprints

How We Detect Customize Twenty Sixteen

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/customize-twenty-sixteen/style.css/wp-content/plugins/customize-twenty-sixteen/script.js
Script Paths
/wp-content/plugins/customize-twenty-sixteen/script.js
Version Parameters
customize-twenty-sixteen/style.css?ver=customize-twenty-sixteen/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
bt-remove-body-spacebt-remove-header-spacebt-remove-entry-headerbt-menu-leftbt-menu-center-below
FAQ

Frequently Asked Questions about Customize Twenty Sixteen