File Groups Security & Risk Analysis

wordpress.org/plugins/file-groups

Add "file group" multiple file handling capability.

10 active installs v1.1.5 PHP + WP 3.1+ Updated Unknown
attachmentfilefile-groupfile-groupsfiles
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is File Groups Safe to Use in 2026?

Generally Safe

Score 100/100

File Groups has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "file-groups" plugin v1.1.5 exhibits a mixed security posture. On the positive side, the plugin has a very small attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, there are no known vulnerabilities (CVEs) associated with this plugin, and its vulnerability history is clean. The use of prepared statements for most SQL queries is also a good practice.

However, significant concerns arise from the static analysis. The most critical finding is a high severity taint flow, indicating a potential vulnerability where user input could be manipulated. The low percentage of properly escaped output (9%) is a major red flag, suggesting a high risk of cross-site scripting (XSS) vulnerabilities. The presence of unsanitized paths in taint flows further exacerbates this risk. The single file operation, while not inherently bad, needs careful scrutiny in conjunction with the taint analysis. The absence of nonce checks on any entry points (though the attack surface is zero) and only one capability check means that even if an entry point were discovered, authorization might be weak.

In conclusion, while the plugin has a minimal attack surface and a clean vulnerability history, the static analysis reveals significant weaknesses, particularly in output escaping and taint flow handling. These issues present a considerable risk that outweighs the plugin's limited attack surface. Developers should prioritize addressing the output escaping and taint flow vulnerabilities immediately.

Key Concerns

  • High severity taint flow found
  • Only 9% of outputs properly escaped
  • Unsanitized paths in taint flows
  • One file operation present
  • No nonce checks found
  • Only one capability check found
Vulnerabilities
None known

File Groups Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

File Groups Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
4 prepared
Unescaped Output
20
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

80% prepared5 total queries

Output Escaping

9% escaped22 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
fg_files_metabox (admin-includes.php:52)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

File Groups Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 20
actioninitfile-groups.php:21
actionadmin_enqueue_scriptsfile-groups.php:22
actionadmin_menufile-groups.php:23
actionadd_meta_boxesfile-groups.php:26
actionsave_postfile-groups.php:27
actionpost_edit_form_tagfile-groups.php:28
actionin_admin_headerfile-groups.php:31
actionadmin_initfile-groups.php:32
actiondbx_post_advancedfile-groups.php:35
actiondelete_postfile-groups.php:38
filterthe_contentfile-groups.php:41
filtermanage_posts_columnsfile-groups.php:44
actionmanage_posts_custom_columnfile-groups.php:45
actionrestrict_manage_postsfile-groups.php:49
filterrequestfile-groups.php:50
actionrestrict_manage_postsfile-groups.php:56
filtermedia_row_actionsfile-groups.php:57
filterwp_redirectfile-groups.php:58
actionall_admin_noticesfile-groups.php:59
actionwidgets_initwidgets.php:85
Maintenance & Trust

File Groups Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedUnknown
PHP min version
Downloads9K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

File Groups Developer Profile

mitcho (Michael Yoshitaka Erlewine)

13 plugins · 6K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect File Groups

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/file-groups/file-groups.css
Version Parameters
file-groups/style.css?ver=file-groups.css?ver=

HTML / DOM Fingerprints

CSS Classes
fg_xitfg_list_itemfg_list_item_link
FAQ

Frequently Asked Questions about File Groups