DX Template Manager Security & Risk Analysis

wordpress.org/plugins/dx-template-manager

Create page templates like the ones in your theme folder but through a "DX Templates" menu in your Admin dashboard - HTML, JS, PHP supported …

10 active installs v1.1 PHP + WP 3.3.1+ Updated Sep 8, 2014
evaluationexecutephptemplate
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is DX Template Manager Safe to Use in 2026?

Generally Safe

Score 85/100

DX Template Manager has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "dx-template-manager" plugin version 1.1 exhibits a generally strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with an exposed attack surface is a significant positive. Furthermore, the lack of dangerous function usage, file operations, and external HTTP requests mitigates common plugin vulnerabilities. The vulnerability history is also clean, with no recorded CVEs, suggesting a well-maintained or less-targeted plugin.

However, there are areas for concern. The limited output escaping (only 20% properly escaped) presents a risk of Cross-Site Scripting (XSS) vulnerabilities, especially if any of the unescaped outputs handle user-supplied data or data from less trusted sources. The complete absence of nonce checks and capability checks, while not directly exploitable given the lack of entry points, indicates a lack of defense-in-depth. If new entry points are added in future versions without corresponding security checks, this could become a significant vulnerability.

In conclusion, version 1.1 of "dx-template-manager" appears relatively secure due to its minimal attack surface and clean vulnerability history. The primary weakness lies in the insufficient output escaping, which should be addressed to prevent potential XSS attacks. The lack of authorization and nonces, while not an immediate threat, represents a missed opportunity for robust security practices.

Key Concerns

  • Insufficient output escaping
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

DX Template Manager Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

DX Template Manager Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
2 prepared
Unescaped Output
4
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

67% prepared3 total queries

Output Escaping

20% escaped5 total outputs
Attack Surface

DX Template Manager Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitdx-template-manager.php:16
filtertemplate_includedx-template-manager.php:20
actionadd_meta_boxesdx-template-manager.php:23
actionsave_postdx-template-manager.php:25
actionadmin_menudx-template-protector.class.php:14
actionadmin_initdx-template-protector.class.php:17
Maintenance & Trust

DX Template Manager Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedSep 8, 2014
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

DX Template Manager Developer Profile

Mario Peshev

13 plugins · 5K total installs

69
trust score
Avg Security Score
86/100
Avg Patch Time
164 days
View full developer profile
Detection Fingerprints

How We Detect DX Template Manager

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about DX Template Manager