Simple Changed Files Security & Risk Analysis

wordpress.org/plugins/simple-changed-files

A very simple plugin that displays the names of files changed after a given time or within a time range.

10 active installs v1.1 PHP + WP 3.0+ Updated Dec 16, 2013
admincodesecurity
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple Changed Files Safe to Use in 2026?

Generally Safe

Score 85/100

Simple Changed Files has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "simple-changed-files" v1.1 plugin exhibits a mixed security posture. On the positive side, the static analysis reveals no apparent critical vulnerabilities such as dangerous functions, raw SQL queries, or external HTTP requests. The plugin also correctly utilizes prepared statements for its SQL operations, which is a strong security practice. Furthermore, the absence of known CVEs in its vulnerability history suggests a potentially stable and well-maintained codebase.

However, significant concerns arise from the lack of output escaping. With 9 total outputs and 0% properly escaped, this presents a considerable risk of cross-site scripting (XSS) vulnerabilities. Any user-supplied data that is displayed without proper sanitization could be exploited by attackers to inject malicious scripts. While there are no identified taint flows indicating immediate severe exploitation, the unescaped output is a foundational weakness that could be leveraged in conjunction with other less obvious entry points not highlighted by this specific analysis.

Despite the lack of direct vulnerabilities like unpatched CVEs or severe taint flows, the pervasive issue of unescaped output makes the plugin a notable risk. The absence of a complex attack surface is positive, but the identified output escaping deficiency is a critical flaw that needs immediate attention. The plugin's strengths lie in its avoidance of common pitfalls like raw SQL and dangerous functions, but its weakness in output sanitization is a significant liability.

Key Concerns

  • Unescaped output across all outputs
Vulnerabilities
None known

Simple Changed Files Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Simple Changed Files Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped9 total outputs
Attack Surface

Simple Changed Files Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menuclasses\SimpleChangedFilesController.php:61
Maintenance & Trust

Simple Changed Files Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedDec 16, 2013
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Simple Changed Files Developer Profile

Peter Wooster

4 plugins · 520 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Changed Files

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-changed-files/css/style.css/wp-content/plugins/simple-changed-files/js/admin.js
Script Paths
/wp-content/plugins/simple-changed-files/js/admin.js
Version Parameters
simple-changed-files/css/style.css?ver=simple-changed-files/js/admin.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Simple Changed Files