Thesis Footer Tool Security & Risk Analysis

wordpress.org/plugins/thesis-footer-tool

Provides a simple way to manage items in and around the footer of a Thesis Theme.

30 active installs v0.1 PHP + WP 2.8+ Updated Jul 31, 2010
contentsindexpages
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Thesis Footer Tool Safe to Use in 2026?

Generally Safe

Score 85/100

Thesis Footer Tool has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "thesis-footer-tool" v0.1 plugin exhibits a mixed security posture. On the positive side, there are no recorded vulnerabilities (CVEs) and the static analysis shows a zero attack surface in terms of AJAX handlers, REST API routes, shortcodes, and cron events. Additionally, all SQL queries utilize prepared statements, which is a strong security practice. However, there are significant concerns, primarily stemming from the lack of output escaping. With 100% of outputs unescaped, this plugin is highly susceptible to Cross-Site Scripting (XSS) vulnerabilities. Any data processed or displayed by the plugin, if not properly sanitized before rendering, could be exploited by attackers to inject malicious scripts.

The absence of taint analysis flows doesn't necessarily mean there are no vulnerabilities, but rather that the analysis might not have found them based on its defined rules or the code structure. The lack of capability checks and nonce checks on what would typically be entry points (if any existed) also raises concerns, though the current analysis reports zero such entry points. The vulnerability history being clean is a positive indicator, but it cannot compensate for the critical flaw of unescaped output, which is a fundamental security requirement for any WordPress plugin. The plugin's strengths lie in its minimal attack surface and secure SQL practices, but its weakness in output sanitization poses a severe risk.

Key Concerns

  • No output escaping
  • No capability checks
  • No nonce checks
Vulnerabilities
None known

Thesis Footer Tool Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Thesis Footer Tool Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
24
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped24 total outputs
Attack Surface

Thesis Footer Tool Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_menuthesis-footer-tool.php:51
actionwp_headthesis-footer-tool.php:52
actionadmin_headthesis-footer-tool.php:53
filterplugin_action_linksthesis-footer-tool.php:54
actionadmin_initthesis-footer-tool.php:55
actionthesis_hook_before_footerthesis-footer-tool.php:58
actionthesis_hook_footerthesis-footer-tool.php:59
actionthesis_hook_after_footerthesis-footer-tool.php:60
Maintenance & Trust

Thesis Footer Tool Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedJul 31, 2010
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

Thesis Footer Tool Developer Profile

GrandSlambert

7 plugins · 170 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Thesis Footer Tool

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/thesis-footer-tool/thesis-footer-tool.css/wp-content/plugins/thesis-footer-tool/thesis-footer-tool.js
Script Paths
/wp-content/plugins/thesis-footer-tool/thesis-footer-tool.js

HTML / DOM Fingerprints

CSS Classes
rp-contributorrp_contributor_notes
FAQ

Frequently Asked Questions about Thesis Footer Tool