
Resource Library Security & Risk Analysis
wordpress.org/plugins/resource-libraryDocument management at its finest. Easily create and manage a document download and viewing area for your website.
Is Resource Library Safe to Use in 2026?
Generally Safe
Score 85/100Resource Library has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "resource-library" plugin version 0.1.2 exhibits a mixed security posture. On the positive side, it has a very small attack surface, with only one shortcode and no unprotected entry points. The plugin also demonstrates good practices regarding SQL queries, exclusively using prepared statements, and includes nonce and capability checks for some operations. Furthermore, the absence of known CVEs and a clean vulnerability history suggests a developer who has historically addressed security concerns promptly or has not yet encountered significant vulnerabilities.
However, several critical concerns are raised by the static analysis. The presence of the `unserialize` function is a significant risk, as it can lead to remote code execution if not handled with extreme care and validated input. Additionally, the fact that 100% of the plugin's outputs are not properly escaped poses a high risk of cross-site scripting (XSS) vulnerabilities. The taint analysis revealing two flows with unsanitized paths, while not classified as critical or high severity, still indicates potential for insecure data handling. The file operations also warrant attention given the lack of output escaping and the potential for insecure path manipulation.
In conclusion, while the plugin has strengths in its limited attack surface and adherence to some secure coding practices like prepared statements and checks, the unescaped outputs and the use of `unserialize` are substantial weaknesses. The lack of historical vulnerabilities is reassuring but does not negate the present risks identified in the code. Developers should prioritize addressing the XSS and `unserialize` risks immediately.
Key Concerns
- Unescaped output detected
- Use of unserialize function
- Taint flow with unsanitized path (2 instances)
Resource Library Security Vulnerabilities
Resource Library Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Resource Library Attack Surface
Shortcodes 1
WordPress Hooks 19
Maintenance & Trust
Resource Library Maintenance & Trust
Maintenance Signals
Community Trust
Resource Library Alternatives
Simple File List
simple-file-list
Simple File List gives your WordPress website a list of your files which allows your users to open and download them.
AAM Protected Media Files
aam-protected-media-files
Add-on to the free Advanced Access Manager plugin that protects media files from direct access for visitors, roles or users
Partners
partners
Creates a fenced membership area with private content.
Documents Shortcode
documents-shortcode
A [documents] shortcode which will display a list of attached files, with file type icons, and linked to the files for easy downloading.
XT Corporate ToolKit
xt-corporate-toolkit
Adding Custom post type and Taxonomy functionality to themes.
Resource Library Developer Profile
2 plugins · 510 total installs
How We Detect Resource Library
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/resource-library/inc/admin.css/wp-content/plugins/resource-library/inc/admin.js/wp-content/plugins/resource-library/inc/fontello/css/fontello.css/wp-content/plugins/resource-library/inc/fontello/css/fontello-ie7.css/wp-content/plugins/resource-library/inc/front.css/wp-content/plugins/resource-library/inc/front.js/wp-content/plugins/resource-library/inc/admin.js/wp-content/plugins/resource-library/inc/front.jsresource-library/inc/admin.css?ver=0.1.2resource-library/inc/admin.js?ver=0.1.2resource-library/inc/fontello/css/fontello.css?ver=0.1.2resource-library/inc/fontello/css/fontello-ie7.css?ver=0.1.2resource-library/inc/front.css?ver=0.1.2resource-library/inc/front.js?ver=0.1.2HTML / DOM Fingerprints
mdresourcelib-fontellomdresourcelib-fontello-ie7mdresourcelib-frontdata-iddata-titledata-captiondata-typedata-locationmdresourcelib-fontellomdresourcelib-fontello-ie7mdresourcelib-front<div class="resource-library-container"><div class="resource-library-terms"><div class="resource-library-docs">