Template Dictionary Security & Risk Analysis

wordpress.org/plugins/template-dictionary

A plugin for developers which provides template variables dictionary editable in backend.

10 active installs v1.6.1 PHP + WP 4.5+ Updated Nov 16, 2020
dictionaryoptionssettingstemplatevariables
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Template Dictionary Safe to Use in 2026?

Generally Safe

Score 85/100

Template Dictionary has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "template-dictionary" plugin v1.6.1 exhibits a generally positive security posture based on the provided static analysis and vulnerability history. The absence of known CVEs, critical taint flows, and any history of vulnerabilities is a strong indicator of well-maintained and secure code. Furthermore, the plugin demonstrates good practices by utilizing prepared statements for the vast majority of its SQL queries and incorporating nonce and capability checks for its entry points.

However, there are areas of concern that warrant attention. The taint analysis reveals 5 flows with unsanitized paths, all of which are flagged as high severity. This suggests a potential for attackers to inject malicious data that is not properly handled. Additionally, a significant weakness is the low percentage of properly escaped outputs (11%). This opens the door to Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected and executed in the user's browser. The presence of file operations also requires careful scrutiny to ensure proper access controls and sanitization are in place.

In conclusion, while the plugin benefits from a clean vulnerability history and good security hygiene in SQL queries and authentication checks, the high number of unsanitized paths and the critically low rate of output escaping present a tangible risk. Addressing these specific code-level issues should be the priority for improving the plugin's overall security.

Key Concerns

  • High severity taint flows with unsanitized paths
  • Low percentage of properly escaped outputs
  • Presence of file operations
Vulnerabilities
None known

Template Dictionary Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Template Dictionary Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
17 prepared
Unescaped Output
25
3 escaped
Nonce Checks
5
Capability Checks
5
File Operations
1
External Requests
0
Bundled Libraries
1

Bundled Libraries

Select2

SQL Query Safety

94% prepared18 total queries

Output Escaping

11% escaped28 total outputs
Data Flows
5 unsanitized

Data Flow Analysis

5 flows5 with unsanitized paths
handle_add_edit_setting (admin\admin.php:414)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Template Dictionary Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[tmpl_dict] template-dictionary.php:128
WordPress Hooks 14
actionplugins_loadedadmin\admin.php:69
actionplugins_loadedadmin\admin.php:70
actionplugins_loadedadmin\admin.php:71
actionplugins_loadedadmin\admin.php:72
actionadmin_enqueue_scriptsadmin\admin.php:74
actionadmin_menuadmin\admin.php:75
filtertemplate_dictionary_languageadmin\admin.php:77
filterset-screen-optionadmin\admin.php:78
filtertemplate_dictionary_languageincludes\polylang.php:16
filtertemplate_dictionary_languagesincludes\polylang.php:25
actioninittemplate-dictionary.php:120
actionplugins_loadedtemplate-dictionary.php:122
actionplugins_loadedtemplate-dictionary.php:123
actionwp_headtemplate-dictionary.php:125
Maintenance & Trust

Template Dictionary Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedNov 16, 2020
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Template Dictionary Developer Profile

radovank

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Template Dictionary

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/template-dictionary/admin/css/style.css/wp-content/plugins/template-dictionary/admin/js/script.js/wp-content/plugins/template-dictionary/includes/polylang.php/wp-content/plugins/template-dictionary/admin/admin.php
Script Paths
/wp-content/plugins/template-dictionary/admin/js/script.js
Version Parameters
template-dictionary/admin/css/style.css?ver=template-dictionary/admin/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
tdict-admintdict-admin-listtdict-admin-form
Data Attributes
data-tdict-code
JS Globals
template_dictionarytdict
Shortcode Output
[tmpl_dict code=
FAQ

Frequently Asked Questions about Template Dictionary