
Exploit Scanner for Active Theme Security & Risk Analysis
wordpress.org/plugins/exploit-scanner-for-active-themeDetects whether your theme files have fallen victim to malicious hackers.
Is Exploit Scanner for Active Theme Safe to Use in 2026?
Generally Safe
Score 85/100Exploit Scanner for Active Theme has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'exploit-scanner-for-active-theme' v1.0.5 plugin exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The absence of known CVEs and a lack of critical findings in taint analysis are significant positive indicators. The plugin demonstrates good practice by implementing nonce checks and capability checks for its AJAX handlers, and all SQL queries are secured using prepared statements. Furthermore, the limited number of entry points and the lack of REST API routes, shortcodes, or cron events contribute to a reduced attack surface.
Key Concerns
- One file operation without specific context
- One third of outputs not properly escaped
Exploit Scanner for Active Theme Security Vulnerabilities
Exploit Scanner for Active Theme Code Analysis
Output Escaping
Data Flow Analysis
Exploit Scanner for Active Theme Attack Surface
AJAX Handlers 3
WordPress Hooks 4
Maintenance & Trust
Exploit Scanner for Active Theme Maintenance & Trust
Maintenance Signals
Community Trust
Exploit Scanner for Active Theme Alternatives
Exploit Scanner
exploit-scanner
Search the files and database of your WordPress install for signs that may indicate that it has fallen victim to malicious hackers.
Injection Guard
injection-guard
This plugin blocks all unauthorized and irrelevant requests through query strings and provides extended session tracking and capability audit.
Gauntlet Security
gauntlet-security
Performs a detailed security analysis of your WordPress installation. Provides specific instructions on how to make your site more secure.
WP-Sentinel
wp-sentinel
A wordpress security system plugin which will check every HTTP request against a given set of rules to filter out malicious requests.
Proxy Hacking Protection
ph-protection
To prevent a reduction in the search results by the replication of illegal content.
Exploit Scanner for Active Theme Developer Profile
3 plugins · 330 total installs
How We Detect Exploit Scanner for Active Theme
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/exploit-scanner-for-active-theme/js/custom.js/wp-content/plugins/exploit-scanner-for-active-theme/css/styles.css/wp-content/plugins/exploit-scanner-for-active-theme/js/custom.jsHTML / DOM Fingerprints
px-theme-scanner-hashespx-theme-scanner-scanpx-theme-scanner-resultscard-toolshas-hashesdata-action="pxNewHashes"data-action="pxScanHashes"data-action="pxUploadJSON"pxThemeScannerVars/wp-json/wp/v2/posts/wp-json/wp/v2/pages/wp-json/wp/v2/media/wp-json/wp/v2/categories/wp-json/wp/v2/tags/wp-json/wp/v2/users/wp-json/wp/v2/comments/wp-json/wp/v2/types/wp-json/wp/v2/taxonomies/wp-json/wp/v2/settings/wp-json/wp/v2/themes/wp-json/wp/v2/plugins/wp-json/wp/v2/search/wp-json/wp/v2/block-renderer/wp-json/wp/v2/menu-locations/wp-json/wp/v2/menus/wp-json/wp/v2/menu-items/wp-json/wp/v2/term/wp-json/wp/v2/terms