Fibre Security & Risk Analysis

wordpress.org/plugins/fibre

Manage your WordPress websites remotely and learn what you can improve or fix.

100 active installs v1.2.2 PHP 5.3+ WP 4.7+ Updated Unknown
fibremanage
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Fibre Safe to Use in 2026?

Generally Safe

Score 100/100

Fibre has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The static analysis of the "fibre" v1.2.2 plugin indicates a strong security posture. The plugin has no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface with no unprotected entry points. This significantly limits potential avenues for exploitation. Furthermore, the code signals are very positive: no dangerous functions are used, all SQL queries are prepared statements, and output escaping is almost universally applied (97%). The presence of nonce and capability checks, although limited, suggests some awareness of security best practices.

Taint analysis shows no identified unsanitized paths, further reinforcing the absence of critical or high-severity vulnerabilities within the analyzed code. The plugin's vulnerability history is equally impressive, with zero recorded CVEs of any severity and no history of past issues. This lack of known vulnerabilities, combined with the clean static analysis, suggests that the plugin has been developed with security in mind or has a very low likelihood of harboring exploitable flaws.

In conclusion, the "fibre" v1.2.2 plugin exhibits excellent security practices. The absence of attack surface, robust use of prepared statements and output escaping, and a clean vulnerability history all point to a secure plugin. The only minor areas for potential improvement would be to ensure all code paths, particularly any that might be introduced in future updates, continue to adhere to these high standards, and potentially increase the coverage of capability checks if the plugin's functionality expands.

Vulnerabilities
None known

Fibre Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Fibre Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
32 escaped
Nonce Checks
2
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

97% escaped33 total outputs
Attack Surface

Fibre Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_print_styles-settings_page_fibre-clientincludes\admin.php:14
actioninitincludes\client.php:10
actionrest_api_initincludes\client.php:15
filterfibre\client\dataincludes\provider\provider.php:16
actionwp_loginincludes\provider\users.php:13
Maintenance & Trust

Fibre Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version5.3
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Fibre Developer Profile

Tom Greenwood

3 plugins · 320 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Fibre

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/fibre/public/styles/backend.css
Version Parameters
/fibre/public/styles/backend.css?ver=

HTML / DOM Fingerprints

REST Endpoints
/wp-json/fibre/data/wp-json/fibre/user
FAQ

Frequently Asked Questions about Fibre