Darkstar File Manager Security & Risk Analysis

wordpress.org/plugins/darkstar-file-manager

Secure client document management system allowing administrators to share files with clients and clients to upload their own documents.

0 active installs v1.0.3 PHP 7.4+ WP 5.0+ Updated Mar 9, 2026
client-filesclient-portaldocument-managementfile-uploadsecure-documents
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Darkstar File Manager Safe to Use in 2026?

Generally Safe

Score 100/100

Darkstar File Manager has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 26d ago
Risk Assessment

The "darkstar-file-manager" plugin v1.0.3 exhibits a generally strong security posture based on the provided static analysis. The plugin has a very small attack surface with only one entry point (a shortcode) and no identified AJAX handlers or REST API routes that lack authentication or permission checks. Furthermore, the code shows good practices regarding output escaping, with 97% of outputs being properly escaped. The absence of dangerous functions, external HTTP requests, and taint flows with unsanitized paths are also positive indicators.

However, there are areas for improvement. The single SQL query detected is not using prepared statements, which introduces a risk of SQL injection if the input used in that query is not meticulously sanitized. While the plugin has no known CVEs and a clean vulnerability history, this alone does not guarantee future security. The presence of file operations (14) warrants careful review to ensure they are handled securely and do not lead to path traversal or unauthorized file access vulnerabilities, especially given the lack of specific details on their implementation.

In conclusion, "darkstar-file-manager" v1.0.3 appears to be a relatively secure plugin with a limited attack surface and good output escaping. The primary concern lies with the unescaped SQL query, which is a common vulnerability vector. The plugin's lack of reported vulnerabilities is a positive sign, but diligent code review, particularly around file operations and the SQL query, is still recommended to maintain its security.

Key Concerns

  • SQL queries not using prepared statements
Vulnerabilities
None known

Darkstar File Manager Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Darkstar File Manager Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
5
183 escaped
Nonce Checks
9
Capability Checks
6
File Operations
14
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

97% escaped188 total outputs
Data Flows
All sanitized

Data Flow Analysis

5 flows
dsfm_render_user_docs_page (includes\admin-functions.php:51)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Darkstar File Manager Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[dsfm_client_login] includes\client-functions.php:25
WordPress Hooks 14
actionadmin_initdarkstar-file-manager.php:41
actionadmin_noticesdarkstar-file-manager.php:68
actionadmin_initdarkstar-file-manager.php:112
actionplugins_loadeddarkstar-file-manager.php:132
actionwp_enqueue_scriptsdarkstar-file-manager.php:322
actionadmin_enqueue_scriptsincludes\admin-functions.php:4
filteruser_row_actionsincludes\admin-functions.php:18
actionadmin_menuincludes\admin-functions.php:34
actionadmin_headincludes\admin-functions.php:46
filterupload_dirincludes\admin-functions.php:145
actionadmin_initincludes\admin-functions.php:236
filterupload_dirincludes\client-functions.php:109
actioninitincludes\client-functions.php:249
actionadmin_menuincludes\settings.php:4
Maintenance & Trust

Darkstar File Manager Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 9, 2026
PHP min version7.4
Downloads199

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Darkstar File Manager Developer Profile

justinblayney

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Darkstar File Manager

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/darkstar-file-manager/css/styles.css/wp-content/plugins/darkstar-file-manager/js/scripts.js
Script Paths
/wp-content/plugins/darkstar-file-manager/js/scripts.js
Version Parameters
darkstar-file-manager/css/styles.css?ver=darkstar-file-manager/js/scripts.js?ver=

HTML / DOM Fingerprints

CSS Classes
dsfm-containerdsfm-upload-formdsfm-file-listdsfm-file-itemdsfm-delete-buttondsfm-admin-notice
HTML Comments
<!-- Darkstar File Manager Start --><!-- Darkstar File Manager End -->
Data Attributes
data-dsfm-file-iddata-dsfm-delete-nonce
JS Globals
dsfm_ajax_object
FAQ

Frequently Asked Questions about Darkstar File Manager