Show Template Security & Risk Analysis

wordpress.org/plugins/show-template

Prints an html comment in the footer of every page letting you know which template file of your theme was used for the display.

80 active installs v1.1 PHP + WP 3.0+ Updated Sep 12, 2010
developmentshowshow-templatetemplatetheme
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Show Template Safe to Use in 2026?

Generally Safe

Score 85/100

Show Template has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "show-template" v1.1 plugin exhibits a seemingly robust security posture based on the static analysis provided. It boasts a zero-attack surface in terms of common entry points like AJAX handlers, REST API routes, shortcodes, and cron events, with no unprotected handlers or routes identified. The code also demonstrates good practices by using prepared statements for all SQL queries and refraining from dangerous functions, file operations, or external HTTP requests. The absence of any recorded vulnerabilities, CVEs, or taint analysis findings further strengthens this positive impression.

However, a significant concern arises from the output escaping analysis, which indicates that 100% of the detected outputs are not properly escaped. This represents a considerable risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data or dynamic content could be injected into the output without proper sanitization, potentially leading to malicious code execution in the user's browser. The lack of any capability checks or nonce checks, while not directly linked to the attack surface, also indicates a potential for insecure handling of operations if they were to be introduced in future versions. Despite the strengths in preventing direct code execution vulnerabilities, the unescaped output is a critical weakness that must be addressed.

Key Concerns

  • 100% of outputs unescaped
Vulnerabilities
None known

Show Template Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Show Template Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Show Template Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actiontemplate_redirectshow-template.php:22
actionwp_footershow-template.php:46
Maintenance & Trust

Show Template Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedSep 12, 2010
PHP min version
Downloads8K

Community Trust

Rating100/100
Number of ratings1
Active installs80
Developer Profile

Show Template Developer Profile

Matt Martz

12 plugins · 5K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Show Template

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- Active Template: {$this->template} --><!-- The template loader logic has chosen a different template than what was used. Chosen Template: {$this->template} Actual Template: $fudge This will usually occur if the template file was overriden using an action on template_redirect. This is a best effort guess to catch such scenarios as mentioned above but can be incorrect. -->
FAQ

Frequently Asked Questions about Show Template