Theme and Plugin (T&P) Profiler Security & Risk Analysis

wordpress.org/plugins/theme-plugin-profiler

Make your theme or plugin faster, greener and smarter with this plugin, that will tell you which of your functions is eating up most server time.

10 active installs v0.1 PHP + WP 3.0+ Updated Unknown
developerspluginsthemes
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Theme and Plugin (T&P) Profiler Safe to Use in 2026?

Generally Safe

Score 100/100

Theme and Plugin (T&P) Profiler has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "theme-plugin-profiler" v0.1 plugin exhibits a strong security posture based on the provided static analysis. It has no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero-sized attack surface. The code signals are also largely positive, with no dangerous functions, no raw SQL queries (all prepared statements), no file operations, and no external HTTP requests. This indicates good development practices in these areas.

However, a significant concern arises from the output escaping. With 7 total outputs and only 29% properly escaped, there is a high likelihood of cross-site scripting (XSS) vulnerabilities. This means user-supplied or dynamic data displayed to users might not be properly sanitized, allowing attackers to inject malicious scripts. The absence of nonce checks and capability checks on all entry points, coupled with zero taint flows analyzed, means that the analysis might not have fully uncovered potential vulnerabilities, especially concerning privilege escalation or unauthorized actions.

The plugin's vulnerability history is completely clean, with no recorded CVEs. This is a positive indicator, suggesting that either the plugin has not been a target for exploitation, or it has been developed with security in mind. However, the lack of taint analysis and the poor output escaping overshadow this positive aspect, as the identified weaknesses could easily lead to exploitable vulnerabilities that might not yet be reflected in a CVE database. The overall conclusion is that while the plugin avoids common pitfalls like raw SQL and external requests, the significant output escaping deficiency presents a notable risk that needs immediate attention.

Key Concerns

  • Poor output escaping (29% properly escaped)
  • No nonce checks on entry points
  • No capability checks on entry points
  • Limited taint analysis performed
Vulnerabilities
None known

Theme and Plugin (T&P) Profiler Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Theme and Plugin (T&P) Profiler Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

29% escaped7 total outputs
Attack Surface

Theme and Plugin (T&P) Profiler Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_initthplpr.php:22
actionadmin_menuthplpr.php:25
actionmuplugins_loadedthplpr.php:40
actionshutdownthplpr.php:43
Maintenance & Trust

Theme and Plugin (T&P) Profiler Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Theme and Plugin (T&P) Profiler Developer Profile

Christian Jongeneel

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Theme and Plugin (T&P) Profiler

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Theme and Plugin (T&P) Profiler