Template Overide Security & Risk Analysis

wordpress.org/plugins/template-overide

Very simple, it lets you add custom css to your template so when you upgrade the template with the wordpress update function your changes are never lo …

10 active installs v0.8.1 PHP + WP 2.7.1+ Updated Jun 13, 2010
csstemplate
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Template Overide Safe to Use in 2026?

Generally Safe

Score 85/100

Template Overide has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The template-override plugin version 0.8.1 presents a mixed security picture. On the positive side, the plugin exhibits a very small attack surface with no detected AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, it demonstrates good practices by exclusively using prepared statements for SQL queries and making no external HTTP requests. The absence of known CVEs and a clean vulnerability history are also strong indicators of a relatively secure codebase.

However, significant concerns arise from the static analysis. The plugin fails to perform any output escaping on its detected outputs, meaning any data processed by these functions could be vulnerable to cross-site scripting (XSS) attacks. Additionally, the taint analysis revealed two flows with unsanitized paths, which, while not categorized as critical or high severity, still represent potential avenues for exploitation if data originating from untrusted sources is mishandled. The complete lack of nonce and capability checks across all entry points (even though the entry point count is zero) suggests a potential oversight if new entry points are introduced or if the plugin's functionality is expanded without security considerations.

In conclusion, while the plugin's minimal attack surface and SQL handling are commendable, the unescaped output and unsanitized taint flows are serious weaknesses that require immediate attention. The lack of historical vulnerabilities is a positive sign, but it does not negate the current code-level risks.

Key Concerns

  • Outputs are not properly escaped
  • Taint flows with unsanitized paths
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Template Overide Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Template Overide Release Timeline

v0.8.1Current
v0.8
v0.5.1
v0.5
v0.2
v0.1.1
v0.1
Code Analysis
Analyzed Mar 17, 2026

Template Overide Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
tm_overide_options_page (template-overide.php:24)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Template Overide Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninittemplate-overide.php:16
actionadmin_menutemplate-overide.php:17
actionwp_headtemplate-overide.php:18
Maintenance & Trust

Template Overide Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedJun 13, 2010
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Template Overide Developer Profile

Simon Prosser

6 plugins · 6K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Template Overide

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- Template-Overide by Pross --><!-- End -->
Data Attributes
name="newcontent"id="newcontent"
FAQ

Frequently Asked Questions about Template Overide