
Simple Changed Files Security & Risk Analysis
wordpress.org/plugins/simple-changed-filesA very simple plugin that displays the names of files changed after a given time or within a time range.
Is Simple Changed Files Safe to Use in 2026?
Generally Safe
Score 85/100Simple Changed Files has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "simple-changed-files" v1.1 plugin exhibits a mixed security posture. On the positive side, the static analysis reveals no apparent critical vulnerabilities such as dangerous functions, raw SQL queries, or external HTTP requests. The plugin also correctly utilizes prepared statements for its SQL operations, which is a strong security practice. Furthermore, the absence of known CVEs in its vulnerability history suggests a potentially stable and well-maintained codebase.
However, significant concerns arise from the lack of output escaping. With 9 total outputs and 0% properly escaped, this presents a considerable risk of cross-site scripting (XSS) vulnerabilities. Any user-supplied data that is displayed without proper sanitization could be exploited by attackers to inject malicious scripts. While there are no identified taint flows indicating immediate severe exploitation, the unescaped output is a foundational weakness that could be leveraged in conjunction with other less obvious entry points not highlighted by this specific analysis.
Despite the lack of direct vulnerabilities like unpatched CVEs or severe taint flows, the pervasive issue of unescaped output makes the plugin a notable risk. The absence of a complex attack surface is positive, but the identified output escaping deficiency is a critical flaw that needs immediate attention. The plugin's strengths lie in its avoidance of common pitfalls like raw SQL and dangerous functions, but its weakness in output sanitization is a significant liability.
Key Concerns
- Unescaped output across all outputs
Simple Changed Files Security Vulnerabilities
Simple Changed Files Code Analysis
Output Escaping
Simple Changed Files Attack Surface
WordPress Hooks 1
Maintenance & Trust
Simple Changed Files Maintenance & Trust
Maintenance Signals
Community Trust
Simple Changed Files Alternatives
Loginizer
loginizer
Loginizer is a WordPress security plugin which helps you fight against bruteforce attacks.
Admin Menu Editor
admin-menu-editor
Lets you edit the WordPress admin menu. You can re-order, hide or rename menus, add custom menus and more.
InfiniteWP Client
iwp-client
Install this plugin on unlimited sites and manage them all from a central dashboard. This plugin communicates with your InfiniteWP Admin Panel.
WP Ghost (Hide My WP Ghost) – Security & Firewall
hide-my-wp
Hide and Secure WP paths, wp-login, wp-admin, and more. Hack Prevention, Security, Brute Force protection, 8G Firewall, 2FA Passkey Login, and more.
Scripts n Styles
scripts-n-styles
This plugin allows Admin users to individually add HTML, custom CSS, Classes and JavaScript directly to Post, Pages or any other custom post types.
Simple Changed Files Developer Profile
4 plugins · 520 total installs
How We Detect Simple Changed Files
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/simple-changed-files/css/style.css/wp-content/plugins/simple-changed-files/js/admin.js/wp-content/plugins/simple-changed-files/js/admin.jssimple-changed-files/css/style.css?ver=simple-changed-files/js/admin.js?ver=