Extend Theme Customizer Security & Risk Analysis

wordpress.org/plugins/extend-theme-cusotomizer

It is a plugin that allows you to set the theme customizer from json file.

10 active installs v1.0 PHP + WP 3.9+ Updated Jul 18, 2014
option-frameworktheme-customizer
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Extend Theme Customizer Safe to Use in 2026?

Generally Safe

Score 85/100

Extend Theme Customizer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "extend-theme-cusotomizer" v1.0 plugin exhibits a generally good security posture with several positive indicators. The absence of known CVEs and unpatched vulnerabilities is a strong sign of a well-maintained and secure codebase. The plugin also demonstrates good practices by using prepared statements for all SQL queries and having a high percentage of properly escaped outputs, which mitigates common injection risks. The analysis also shows no critical or high-severity taint flows, indicating that user-supplied data is likely handled with care.

However, there are a few areas that warrant attention. The presence of file operations and external HTTP requests, while not inherently problematic, could become vectors if not handled with extreme care, especially in the absence of robust input validation or capability checks. The plugin has a single nonce check, which is a positive step, but the complete lack of capability checks across its attack surface is a significant concern. This means that potentially sensitive actions, if they exist, might be executable by any logged-in user, regardless of their role or permissions. The limited attack surface (0 entry points) is a mitigating factor, but the absence of capability checks for any potential future additions or hidden functionalities is a notable weakness.

In conclusion, the plugin's current security is relatively strong due to the lack of known vulnerabilities and good SQL/output handling. The primary weakness lies in the absence of capability checks, which could pose a risk if the plugin's functionality expands or if any of its current operations are sensitive. While the current attack surface is small and has no unprotected entry points, the lack of capability checks means that the existing entry points, however few, are not adequately protected against unauthorized access by lower-privileged users.

Key Concerns

  • No capability checks implemented
  • Some outputs not properly escaped
  • One external HTTP request
  • File operations present
Vulnerabilities
None known

Extend Theme Customizer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Extend Theme Customizer Release Timeline

v1.0Current
Code Analysis
Analyzed Apr 16, 2026

Extend Theme Customizer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
16
84 escaped
Nonce Checks
1
Capability Checks
0
File Operations
4
External Requests
1
Bundled Libraries
0

Output Escaping

84% escaped100 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
etc_admin_update_option (admin/extend-theme-customizer-admin.php:158)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Extend Theme Customizer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionadmin_menuadmin/extend-theme-customizer-admin.php:38
actionadmin_initadmin/extend-theme-customizer-admin.php:43
actionadmin_initadmin/extend-theme-customizer-admin.php:44
actionplugins_loadedextend-theme-customizer.php:29
actionplugins_loadedextend-theme-customizer.php:48
actionplugins_loadedextend-theme-customizer.php:59
actionwp_dropdown_catsfields/select/class-taxonomy-dropdown-custom-control.php:27
actioninitinc/class-etc-theme-customizer.php:76
actioncustomize_registerinc/class-wp-theme-customizer-import-json.php:104
Maintenance & Trust

Extend Theme Customizer Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedJul 18, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Extend Theme Customizer Developer Profile

ishihara takashi

2 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Extend Theme Customizer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/extend-theme-cusotomizer/assets/css/admin.css/wp-content/plugins/extend-theme-cusotomizer/assets/js/admin.js/wp-content/plugins/extend-theme-cusotomizer/assets/js/customize-media-uploader.js/wp-content/plugins/extend-theme-cusotomizer/assets/css/customize-media-uploader.css
Script Paths
/wp-content/plugins/extend-theme-cusotomizer/admin/extend-theme-customizer-admin.php/wp-content/plugins/extend-theme-cusotomizer/inc/class-etc-theme-customizer.php/wp-content/plugins/extend-theme-cusotomizer/inc/class-wp-theme-customizer-import-json.php/wp-content/plugins/extend-theme-cusotomizer/fields/date/class-date-picker-custom-control.php/wp-content/plugins/extend-theme-cusotomizer/fields/image/class-multi-image-custom-control.php
Version Parameters
extend-theme-cusotomizer/assets/css/admin.css?ver=extend-theme-cusotomizer/assets/js/admin.js?ver=extend-theme-cusotomizer/assets/js/customize-media-uploader.js?ver=extend-theme-cusotomizer/assets/css/customize-media-uploader.css?ver=

HTML / DOM Fingerprints

CSS Classes
customize-date-picker-control
Data Attributes
data-setting="etc_json_settings"data-setting="etc_width_settings"
JS Globals
ETC_AdminWP_Theme_Customizer_Import_JsonDate_Picker_Custom_ControlMulti_Image_Custom_Control
FAQ

Frequently Asked Questions about Extend Theme Customizer