JTZL's Dark Mode Security & Risk Analysis

wordpress.org/plugins/jtzls-dark-mode

Automatic dark mode styling based on visitor OS preference using CSS prefers-color-scheme media query.

0 active installs v1.0.0 PHP 8.2+ WP 6.9+ Updated Feb 25, 2026
accessibilitydark-modedark-themeprefers-color-scheme
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is JTZL's Dark Mode Safe to Use in 2026?

Generally Safe

Score 100/100

JTZL's Dark Mode has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The 'jtzls-dark-mode' v1.0.0 plugin exhibits a mixed security posture. On the positive side, the static analysis reveals no directly exploitable attack surface points like unprotected AJAX handlers, REST API routes, or shortcodes. Furthermore, the code demonstrates good practice by exclusively using prepared statements for SQL queries, and there are no recorded vulnerabilities (CVEs) in its history. This indicates a potential for a well-secured plugin.

However, significant concerns arise from the lack of output escaping and inadequate capability checks. The static analysis shows that 100% of the identified output targets are not properly escaped, presenting a risk of Cross-Site Scripting (XSS) vulnerabilities. Additionally, the complete absence of capability checks and nonce checks, combined with the presence of file operations, suggests that privileged actions or sensitive file manipulations might be accessible without proper authorization. The taint analysis also yielded no results, which in this context, coupled with the other findings, might indicate a lack of comprehensive taint analysis rather than an inherent absence of taint flows.

In conclusion, while the plugin avoids common entry points and handles database interactions securely, the critical deficiency in output escaping and the lack of authorization checks on file operations and other potential actions are serious weaknesses. The absence of any recorded vulnerabilities is a strength, but it does not negate the risks identified in the static code analysis, which warrant immediate attention and remediation to prevent potential security breaches.

Key Concerns

  • Output not properly escaped
  • No nonce checks
  • No capability checks
  • File operations present without auth checks
Vulnerabilities
None known

JTZL's Dark Mode Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

JTZL's Dark Mode Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

JTZL's Dark Mode Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_enqueue_scriptsincludes\Plugin.php:68
actionadmin_noticesjtzls-dark-mode.php:34
actionplugins_loadedjtzls-dark-mode.php:81
Maintenance & Trust

JTZL's Dark Mode Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 25, 2026
PHP min version8.2
Downloads146

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

JTZL's Dark Mode Developer Profile

jtzl

5 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect JTZL's Dark Mode

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/jtzls-dark-mode/build/css/dark-mode-block.min.css/wp-content/plugins/jtzls-dark-mode/build/css/dark-mode-classic.min.css
Version Parameters
jtzls-dark-mode/build/css/dark-mode-block.min.css?ver=jtzls-dark-mode/build/css/dark-mode-classic.min.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about JTZL's Dark Mode