
Folding Archives Security & Risk Analysis
wordpress.org/plugins/folding-archivesA simple widget providing a customisable, animated dropdown menu to display archives.
Is Folding Archives Safe to Use in 2026?
Generally Safe
Score 100/100Folding Archives has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "folding-archives" v1.0 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by using prepared statements for all SQL queries and avoids external HTTP requests or file operations, which are common vectors for vulnerabilities. The absence of known CVEs and historical vulnerabilities is also a strong indicator of a generally secure development history. However, several concerning signals arise from the static code analysis. The presence of the `create_function` function is a significant security risk, as it is deprecated and can be exploited for arbitrary code execution if not handled with extreme care, especially in user-facing contexts. Furthermore, a very low percentage of output escaping (15%) suggests a high likelihood of cross-site scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website. The complete lack of nonce and capability checks, while aligned with the zero entry points found, means that if any entry points were ever added without proper security measures, they would be immediately vulnerable. The zero taint analysis flows can be attributed to the limited entry points and the lack of exploitable code patterns detected in the analyzed paths, but this does not negate the risks posed by `create_function` and poor output escaping.
In conclusion, while the plugin has a clean vulnerability history and good practices in SQL handling, the identified code signals of `create_function` and significantly inadequate output escaping present substantial security weaknesses. The lack of any detected entry points is a strength, but the potential for injection vulnerabilities remains high due to poor output sanitization. Until these critical code-level issues are addressed, the plugin should be considered a security risk, particularly if its functionality expands or user-provided data is ever displayed.
Key Concerns
- Dangerous function 'create_function' used
- Low percentage of properly escaped output (15%)
- No nonce checks detected
- No capability checks detected
Folding Archives Security Vulnerabilities
Folding Archives Code Analysis
Dangerous Functions Found
Output Escaping
Folding Archives Attack Surface
WordPress Hooks 1
Maintenance & Trust
Folding Archives Maintenance & Trust
Maintenance Signals
Community Trust
Folding Archives Alternatives
Collapsing Archives
collapsing-archives
This plugin uses Javascript to dynamically expand or collapse the set of months for each year and posts for each month in the archive listing of your …
Expanding Archives
expanding-archives
This plugin adds a new widget where you can view your old posts by expanding certain years and months.
Sliding Panel
sliding-panel
Adds a responsive sliding panel to the top of your WordPress-powered site.
ARCW Popover Addon
arcw-popover-addon
Popover Addon for Archives Calendar Widget
jQuery Tabber Widget
jquery-tabber-widget
A simple widget to display a jquery based tabbed menu for recent, random and popular posts.
Folding Archives Developer Profile
6 plugins · 400 total installs
How We Detect Folding Archives
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/folding-archives/folding.js/wp-content/plugins/folding-archives/folding.jsHTML / DOM Fingerprints
widget_folding_archivesarchive-titlearchive_postid="collapsible-archives"