File Change Monitor Security & Risk Analysis

wordpress.org/plugins/file-change-monitor

Detects file changes in WordPress core, themes, and plugins. Sends email alerts to the site admin.

10 active installs v1.0.4 PHP 7.2+ WP 5.0+ Updated Oct 21, 2025
file-changefile-integritymalware-detectionsecuritywordpress-monitor
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is File Change Monitor Safe to Use in 2026?

Generally Safe

Score 100/100

File Change Monitor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The file-change-monitor plugin version 1.0.4 exhibits a generally strong security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, or shortcodes with inadequate authentication checks is a significant strength, minimizing the plugin's direct attack surface. Furthermore, the code's adherence to prepared statements for SQL queries and proper output escaping demonstrates good development practices. The vulnerability history being entirely clear also suggests a well-maintained and secure codebase to date.

However, a notable concern arises from the complete lack of nonce checks and capability checks across all entry points. While the current entry points are limited, this absence represents a potential weakness if new functionalities are added or if the existing cron event is exploited in conjunction with other vulnerabilities. The presence of file operations, though not explicitly flagged as malicious, always warrants careful consideration in terms of potential path traversal or unauthorized file access if not handled with extreme caution. The lack of any taint analysis results also means that potential vulnerabilities related to unsanitized user input being used in file operations or other sensitive functions may have been missed.

In conclusion, file-change-monitor v1.0.4 is currently a very secure plugin with a minimal attack surface and no recorded vulnerabilities. The developers have implemented good security practices concerning SQL and output. The primary area for improvement and potential future risk lies in the complete absence of nonce and capability checks, which should be addressed to ensure ongoing security as the plugin evolves. The presence of file operations also suggests a need for continued vigilance.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • File operations present, potential for misuse
Vulnerabilities
None known

File Change Monitor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

File Change Monitor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0
Attack Surface

File Change Monitor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filtercron_schedulesfile-change-monitor.php:67
actionwpfile-change-monitor.php:82
actionfile_change_monitor_cron_hookfile-change-monitor.php:85

Scheduled Events 1

file_change_monitor_cron_hook
Maintenance & Trust

File Change Monitor Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedOct 21, 2025
PHP min version7.2
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

File Change Monitor Developer Profile

Osman

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect File Change Monitor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about File Change Monitor