Stencil Security & Risk Analysis

wordpress.org/plugins/stencil

The fastest and easiest way to design images as you write posts in WordPress. Millions of stock photos, premium icons & templates at your fingertips.

1K active installs v1.14.9 PHP 5.2.4+ WP 4.0+ Updated Feb 1, 2022
designgraphic-designgraphicsmedia-libraryphotos
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Stencil Safe to Use in 2026?

Generally Safe

Score 85/100

Stencil has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

Based on the static analysis and vulnerability history provided, the 'stencil' plugin v1.14.9 exhibits a strong security posture. The code analysis reveals no identified dangerous functions, no raw SQL queries, and all identified outputs are properly escaped. Furthermore, there are no reported vulnerabilities (CVEs) associated with this plugin, which is a significant positive indicator of its security. The complete absence of entry points like AJAX handlers, REST API routes, shortcodes, and cron events, or the fact that any potential entry points are protected, further reduces the attack surface and the likelihood of common attack vectors being exploited. The lack of any identified taint flows or unsanitized paths is also reassuring. However, it is worth noting that the static analysis did not identify any capability checks or nonce checks. While this might be acceptable if the plugin has no user-facing interactive elements that require such checks, it represents a potential area of concern if any such features exist but are not being secured. The absence of external HTTP requests and file operations also contributes to a more secure profile. Overall, the plugin appears to be well-developed from a security perspective, with no immediate exploitable weaknesses identified in the provided data.

Key Concerns

  • No capability checks identified
  • No nonce checks identified
Vulnerabilities
None known

Stencil Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Stencil Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Stencil Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionwp_loadedadmin\class-stencil-admin.php:54
actionadmin_noticesadmin\class-stencil-admin.php:58
actionplugins_loadedincludes\class-stencil.php:142
actionadmin_enqueue_scriptsincludes\class-stencil.php:157
actionadmin_enqueue_scriptsincludes\class-stencil.php:158
actionwp_enqueue_scriptsincludes\class-stencil.php:173
actionwp_enqueue_scriptsincludes\class-stencil.php:174
actionelementor/editor/before_enqueue_scriptsstencil.php:76
actionfl_builder_layout_style_dependenciesstencil.php:89
actionet_fb_framework_loadedstencil.php:103
Maintenance & Trust

Stencil Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.0
Last updatedFeb 1, 2022
PHP min version5.2.4
Downloads48K

Community Trust

Rating82/100
Number of ratings9
Active installs1K
Developer Profile

Stencil Developer Profile

Stencil

1 plugin · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Stencil

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/stencil/admin/css/stencil-admin.css/wp-content/plugins/stencil/admin/js/stencil-admin.js
Script Paths
/wp-content/plugins/stencil/admin/js/stencil-admin.js
Version Parameters
stencil/admin/css/stencil-admin.css?ver=stencil/admin/js/stencil-admin.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- Stencil Admin -->
Data Attributes
data-dismissible="disable-media-notice-forever"
FAQ

Frequently Asked Questions about Stencil