Theme Folders Security & Risk Analysis

wordpress.org/plugins/theme-folders

A plugin to sort themes. For an easy overview about your favorite Themes.

10 active installs v0.2 PHP + WP 3.0+ Updated Oct 30, 2016
categoriescategorydevelopmentthemes-folder-labelingthemes-label
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Theme Folders Safe to Use in 2026?

Generally Safe

Score 85/100

Theme Folders has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "theme-folders" v0.2 plugin presents a mixed security posture. On one hand, it boasts a clean vulnerability history with no known CVEs, indicating a potentially stable and well-maintained codebase. The static analysis also shows no dangerous functions, no direct SQL queries without prepared statements, and no file operations or external HTTP requests, which are positive indicators. However, there are significant concerns within the code analysis. A critical weakness is that 100% of the 10 identified output operations are not properly escaped. This means that any data output by the plugin could be vulnerable to cross-site scripting (XSS) attacks if that data originates from user input or external sources without prior sanitization.

The taint analysis reveals two flows with unsanitized paths. While these are not classified as critical or high severity, the presence of unsanitized paths suggests a potential for unexpected behavior or data manipulation if these flows are triggered in specific ways. The complete absence of nonce checks and capability checks on any entry points, although the attack surface is reported as zero, is a concern. If the attack surface were to expand in future versions or if the reporting is incomplete, these missing checks would be a significant vulnerability. Therefore, while the plugin appears to have a good track record and avoids common pitfalls like raw SQL, the lack of output escaping and the presence of unsanitized paths are notable risks that need to be addressed.

Key Concerns

  • 100% of outputs are unescaped
  • 2 flows with unsanitized paths
  • 0 Nonce checks on entry points
  • 0 Capability checks on entry points
Vulnerabilities
None known

Theme Folders Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Theme Folders Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped10 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
themes_in_folders (theme-folders.php:29)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Theme Folders Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menutheme-folders.php:27
Maintenance & Trust

Theme Folders Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedOct 30, 2016
PHP min version
Downloads2K

Community Trust

Rating40/100
Number of ratings1
Active installs10
Developer Profile

Theme Folders Developer Profile

theode

11 plugins · 220 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Theme Folders

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
theme_folder_itemno-lines
Data Attributes
id="theme_folder_item"id="theme-form-name="design_folders"
FAQ

Frequently Asked Questions about Theme Folders