Old Core Files Security & Risk Analysis

wordpress.org/plugins/old-core-files

Increase your WordPress security by deleting old core files that exist in the filesystem before hackers exploit them for attacks.

200 active installs v1.4 PHP 5.2.4+ WP 3.0+ Updated Jul 6, 2019
core-filesold-filesold_filessecuritytool
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Old Core Files Safe to Use in 2026?

Generally Safe

Score 85/100

Old Core Files has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "old-core-files" v1.4 plugin exhibits a generally strong security posture based on the static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the code demonstrates good practices by exclusively using prepared statements for SQL queries and properly escaping a high percentage of its outputs.

However, a few concerns warrant attention. The presence of the `set_time_limit` function is a potential risk, as it can be exploited to extend script execution time, potentially leading to denial-of-service conditions if abused. While taint analysis showed no unsanitized flows, the lack of nonce checks across all entry points is a significant oversight. This means that if any user-facing functionality were to be added in the future, it would be susceptible to CSRF attacks without proper nonce implementation.

The plugin's vulnerability history is remarkably clean, with no recorded CVEs. This suggests a history of secure development or a lack of past targeting. Overall, "old-core-files" v1.4 is a promising plugin from a security perspective due to its limited attack surface and good coding practices. However, the unaddressed potential for CSRF due to missing nonce checks and the use of `set_time_limit` represent areas for improvement to achieve a truly robust security profile.

Key Concerns

  • Missing nonce checks on entry points
  • Dangerous function: set_time_limit
  • Moderate unescaped output percentage
Vulnerabilities
None known

Old Core Files Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Old Core Files Release Timeline

v1.4Current
v1.3
v1.2
v1.1.3
v1.1.2
v1.1
v1.0
Code Analysis
Analyzed Apr 16, 2026

Old Core Files Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
3
22 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

set_time_limit@set_time_limit( 300 );old-core-files.php:271

Output Escaping

88% escaped25 total outputs
Attack Surface

Old Core Files Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filterocf_filter_methodsocf-extension-example.php:25
actioninitold-core-files.php:116
actionadmin_menuold-core-files.php:136
actionadd_meta_boxesold-core-files.php:139
filterfilesystem_methodold-core-files.php:247
actionplugins_loadedold-core-files.php:510
Maintenance & Trust

Old Core Files Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedJul 6, 2019
PHP min version5.2.4
Downloads25K

Community Trust

Rating100/100
Number of ratings3
Active installs200
Developer Profile

Old Core Files Developer Profile

Maor Chasen

6 plugins · 930 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Old Core Files

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Old Core Files