
Files Fence Security & Risk Analysis
wordpress.org/plugins/files-fenceDetect if a wordpress core files are changed and if a unwanted file(s) are uploaded or created in wordpress folders different to wp-content
Is Files Fence Safe to Use in 2026?
Generally Safe
Score 100/100Files Fence has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'files-fence' plugin v0.1.3 exhibits a generally good security posture with several positive indicators. The absence of known CVEs and a clean vulnerability history suggest a commitment to security or a lack of past exploitable issues. The code also demonstrates strong practices in SQL query preparation (82% prepared) and output escaping (92% properly escaped), significantly mitigating risks related to common web vulnerabilities like SQL injection and cross-site scripting. Furthermore, the limited attack surface with no AJAX handlers, REST API routes, or shortcodes, and only one cron event, reduces the potential entry points for attackers.
However, there are specific areas of concern that warrant attention. The taint analysis reveals two flows with unsanitized paths, indicating a potential for path traversal vulnerabilities. While no critical or high severity taint flows were found, the presence of these unsanitized paths is a notable weakness. The plugin also lacks nonce checks on its entry points, which, while currently limited in number, could be exploited if an attack vector is discovered that leverages these handlers. Additionally, only one capability check was identified, suggesting that not all actions within the plugin are adequately protected by WordPress role-based access control.
In conclusion, 'files-fence' v0.1.3 has several strong security practices in place, particularly regarding SQL and output handling. The lack of historical vulnerabilities is a positive sign. Nevertheless, the identified unsanitized paths and the absence of comprehensive nonce and capability checks present clear security risks that should be addressed to further harden the plugin.
Key Concerns
- Taint flows with unsanitized paths (2)
- No nonce checks on entry points
- Only 1 capability check found
Files Fence Security Vulnerabilities
Files Fence Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Files Fence Attack Surface
WordPress Hooks 4
Scheduled Events 1
Maintenance & Trust
Files Fence Maintenance & Trust
Maintenance Signals
Community Trust
Files Fence Alternatives
Reset file and folder permissions
reset-file-and-folder-permissions
A WordPress plugin to reset file permissions to 0644, directory permissions to 0755, and file/folder ownership for security and maintenance purposes.
s2member Secure File Uploader
s2member-secure-file-uploader
A s2member add-on that allows you to upload a file to the s2member-files/ secure directory and automatically insert a link into your post.
WPHH SECURE – AIO WordPress Security With File Locking & WP Hide Login
wphhsecure
Secure your WordPress site with one-click file locking, login path hiding, role-based access, and smart dashboard visibility.
AutoCHMOD
autochmod
Protect folders and files from unhautorized changes managing filesystem permissions.
TTC WordPress Tripwire Tool
ttc-tripwire-plugin
This plugin acts as a tripwire for you. It will give you a list of all files changed on your WordPress site in the last 1-99 days.
Files Fence Developer Profile
5 plugins · 140 total installs
How We Detect Files Fence
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/files-fence/build/css/app.css/wp-content/plugins/files-fence/build/js/app.js/wp-content/plugins/files-fence/build/js/app.jsfiles-fence/build/css/app.css?ver=files-fence/build/js/app.js?ver=HTML / DOM Fingerprints
filesFence/wp-json/filesfence/v1/settings