Demonstrator Security & Risk Analysis

wordpress.org/plugins/demonstrator

More than a theme switcher!

10 active installs v1.3.0 PHP + WP 4.7+ Updated Jul 5, 2018
connectdemoswitcherthemethemeforest
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Demonstrator Safe to Use in 2026?

Generally Safe

Score 85/100

Demonstrator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The 'demonstrator' plugin version 1.3.0 exhibits a generally strong security posture based on the provided static analysis. The plugin has a remarkably small attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events. This lack of entry points significantly reduces the potential for external exploitation. Furthermore, the code signals indicate good practices, such as 100% of SQL queries utilizing prepared statements and no identified dangerous functions or file operations. The absence of known CVEs and historical vulnerabilities further bolsters this positive assessment.

However, there are areas for improvement that slightly temper the otherwise good security. The output escaping is only properly implemented for 67% of outputs, which could leave the plugin susceptible to cross-site scripting (XSS) vulnerabilities if user-controlled data is displayed without adequate sanitization. Additionally, while capability checks are present, the complete absence of nonce checks is a notable concern, especially if any of the capability checks are bypassed or if functionality exists that could be exploited through repeated or unintended requests. The bundled jQuery v3.2.1 is also outdated, which could be a vector for exploits targeting known vulnerabilities in older jQuery versions.

In conclusion, 'demonstrator' v1.3.0 is built with a solid foundation, evident in its minimal attack surface and secure database practices. The lack of historical vulnerabilities is a significant strength. However, the incomplete output escaping and the absence of nonce checks represent potential weaknesses that require attention. The outdated bundled library also introduces a minor, but addressable, risk. Addressing these specific points would elevate the plugin's security to an even higher standard.

Key Concerns

  • Incomplete output escaping (33% unescaped)
  • Bundled outdated jQuery v3.2.1
  • No nonce checks on entry points
Vulnerabilities
None known

Demonstrator Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Demonstrator Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
20
41 escaped
Nonce Checks
0
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

jQuery3.2.1

Output Escaping

67% escaped61 total outputs
Attack Surface

Demonstrator Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 16
actiondemonstrator_headercomponents\ScriptsAndStyles\component.php:7
actiondemonstrator:initcomponents\Settings\component.php:17
actiondemonstrator:initcomponents\Settings\component.php:31
actionplugins_loadeddemonstrator.php:121
actioninitengine\Endpoint.class.php:12
filtertemplate_redirectengine\Endpoint.class.php:13
actionadmin_menuengine\InitPanel.class.php:15
filterdts_settings_panelsengine\InitPanel.class.php:16
actionadmin_initengine\InitPanel.class.php:17
actionadmin_bar_menuengine\InitPanel.class.php:18
actionadmin_enqueue_scriptsengine\InitPanel.class.php:19
actioninitengine\InitPanel.class.php:20
actioninitengine\Redirect.class.php:8
filterdts_settings_fields_typesengine\RegisterFieldType.class.php:12
actionadmin_menuwarnings\abstract-warning.php:11
actionadmin_enqueue_scriptswarnings\abstract-warning.php:12
Maintenance & Trust

Demonstrator Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJul 5, 2018
PHP min version
Downloads2K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

Demonstrator Developer Profile

Andrei Surdu

5 plugins · 10K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Demonstrator

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/demonstrator/engine/Assets/css/admin/style.css/wp-content/plugins/demonstrator/engine/Assets/css/frontend/style.css/wp-content/plugins/demonstrator/engine/Assets/js/admin/script.js/wp-content/plugins/demonstrator/engine/Assets/js/frontend/script.js
Script Paths
/wp-content/plugins/demonstrator/engine/Assets/js/admin/script.js/wp-content/plugins/demonstrator/engine/Assets/js/frontend/script.js
Version Parameters
demonstrator/engine/Assets/css/admin/style.css?ver=demonstrator/engine/Assets/css/frontend/style.css?ver=demonstrator/engine/Assets/js/admin/script.js?ver=demonstrator/engine/Assets/js/frontend/script.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Demonstrator