Random File Security & Risk Analysis

wordpress.org/plugins/random-file

Retrieve the name, path, or link to a randomly chosen file or files in a specified directory.

80 active installs v2.0.1 PHP + WP 2.8+ Updated Apr 8, 2025
coffee2codefilefilesrandomrandomize
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Random File Safe to Use in 2026?

Generally Safe

Score 92/100

Random File has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "random-file" v2.0.1 plugin exhibits a remarkably clean static analysis report, indicating strong adherence to secure coding practices. The complete absence of identified dangerous functions, SQL queries without prepared statements, unescaped output, file operations, external HTTP requests, and taint flows suggests that the plugin is not directly introducing common vulnerabilities. Furthermore, the lack of any recorded CVEs or past vulnerabilities is a positive indicator, implying a history of stable and secure development.

However, the analysis also highlights significant areas of concern, primarily related to the lack of security checks on its entry points. With zero identified AJAX handlers, REST API routes, shortcodes, and cron events that require authentication or permission checks, the plugin exposes a complete absence of defensive programming for any potential interactions. While no specific vulnerabilities are evident in the current code, this lack of explicit security measures on all potential interaction points leaves it highly susceptible to being exploited if any future functionality is added or if an attacker can trigger a hidden or undocumented entry point without proper authorization.

In conclusion, while the "random-file" plugin v2.0.1 is built with generally secure coding principles and has a spotless vulnerability history, its primary weakness lies in the complete absence of security checks on its attack surface. This creates a theoretical risk of unauthorized access or manipulation should any interaction point be discovered or leveraged without proper authorization. The plugin is strong in its current implementation's direct security but weak in its overall defensive posture against potential future or undocumented threats.

Key Concerns

  • No capability checks on any entry points
  • No nonce checks on AJAX handlers
  • No permission callbacks on REST API routes
  • No authentication checks on AJAX handlers
  • No authentication checks on REST API routes
Vulnerabilities
None known

Random File Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Random File Release Timeline

v2.0.1Current
v2.0
v1.8.12
v1.8.11
v1.8.10
v1.8.9
v1.8.8
v1.8.7
v1.8.6
v1.8.5
v1.8.4
v1.8.3
v1.8.2
v1.8.1
v1.8
v1.7.1
v1.7
v1.6.2
v1.6.1
v1.6
Code Analysis
Analyzed Mar 16, 2026

Random File Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped4 total outputs
Attack Surface

Random File Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterc2c_random_filerandom-file.php:160
filterc2c_random_filesrandom-file.php:223
Maintenance & Trust

Random File Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 8, 2025
PHP min version
Downloads29K

Community Trust

Rating100/100
Number of ratings1
Active installs80
Developer Profile

Random File Developer Profile

Scott Reilly

63 plugins · 92K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
374 days
View full developer profile
Detection Fingerprints

How We Detect Random File

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<a href=<a href="<a href='title=
FAQ

Frequently Asked Questions about Random File