File Download Security & Risk Analysis

wordpress.org/plugins/file-download

A simple file download widget for frontend interface. Lets your visitors download brochures etc.

100 active installs v1.0.2 PHP + WP 4.0+ Updated Dec 27, 2019
brochuredocxdownloadfilepdf
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is File Download Safe to Use in 2026?

Generally Safe

Score 85/100

File Download has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The file-download plugin v1.0.2 presents a generally good security posture based on the provided static analysis. There are no identified dangerous functions, no direct SQL queries (all prepared statements), and a high percentage of properly escaped output. Crucially, the plugin exhibits no file operations, external HTTP requests, or a significant attack surface via AJAX, REST API, shortcodes, or cron events. This indicates a conscious effort by the developers to avoid common vulnerabilities.

However, the absence of any nonce checks or capability checks is a notable concern. While the current analysis shows no direct vulnerabilities, this lack of authorization and integrity checks means that if an attack vector were discovered or introduced in the future, there would be no built-in protections against unauthorized actions. The clean vulnerability history is a positive sign, suggesting a history of secure development, but it does not mitigate the inherent risk posed by the missing security checks. Overall, the plugin appears safe in its current state due to the limited attack surface and secure coding practices for identified components, but the missing authorization mechanisms represent a potential weakness that could be exploited.

In conclusion, the plugin demonstrates strengths in preventing common code-level vulnerabilities through careful function usage and output handling. Its minimal attack surface further contributes to its security. The primary weakness lies in the complete lack of nonce and capability checks, which is a significant oversight in WordPress plugin development. While no active exploits are suggested by the data, this omission leaves the plugin susceptible to potential future attacks if an entry point is found or if the plugin's functionality evolves without addressing these critical security measures.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

File Download Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

File Download Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
18 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

95% escaped19 total outputs
Attack Surface

File Download Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_headdownload-widget.php:23
actionwidgets_initdownload-widget.php:110
Maintenance & Trust

File Download Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedDec 27, 2019
PHP min version
Downloads5K

Community Trust

Rating60/100
Number of ratings2
Active installs100
Developer Profile

File Download Developer Profile

avneetk

2 plugins · 190 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect File Download

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
file-download-anchorfile-download-icon
Data Attributes
download
Shortcode Output
<p><a href= download class='file-download-anchor'><img src= class='file-download-icon'><span></span></a></p>
FAQ

Frequently Asked Questions about File Download