What The File Security & Risk Analysis

wordpress.org/plugins/what-the-file

What The File is the best tool to find out what template parts are used to display the page you're currently viewing!

40K active installs v1.6.1 PHP 5.3+ WP 3.1+ Updated Feb 19, 2026
developmentfiletemplatetemplate-editingtoolbar
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is What The File Safe to Use in 2026?

Generally Safe

Score 100/100

What The File has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The 'what-the-file' v1.6.1 plugin exhibits a strong security posture regarding its attack surface and known vulnerabilities. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly reduces the potential entry points for attackers. Furthermore, the plugin has no recorded CVEs, indicating a history of responsible development or minimal public exposure of vulnerabilities. The code analysis also shows a positive sign with 100% of SQL queries utilizing prepared statements, a crucial practice for preventing SQL injection. The presence of capability checks (3) is also a good indicator of access control being considered.

However, there are significant concerns regarding output escaping. With 2 total outputs and 0% properly escaped, this indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that originates from user input or external sources without proper sanitization and escaping is a direct pathway for XSS attacks. The taint analysis, while reporting no critical or high severity flows, might not be capturing potential XSS if the output escaping is universally poor. The lack of nonce checks on any potential entry points (though none are apparent, this is a general concern for any plugin interacting with the frontend or backend) is also a missed opportunity for preventing Cross-Site Request Forgery (CSRF).

In conclusion, while the plugin benefits from a small attack surface and a clean vulnerability history, the complete lack of output escaping is a severe weakness that overshadows these strengths. This single flaw presents a clear and present danger of XSS vulnerabilities, which can lead to session hijacking, defacement, and other malicious activities. Developers must prioritize implementing proper output escaping mechanisms immediately.

Key Concerns

  • 0% output escaping
Vulnerabilities
None known

What The File Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

What The File Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
catch_hide_notice (classes\class-nag.php:19)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

What The File Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
actionadmin_noticesclasses\class-nag.php:61
filterplugin_action_links_what-the-file/what-the-file.phpclasses\class-plugin-links.php:9
actioninitwhat-the-file.php:57
actionadmin_initwhat-the-file.php:58
actionwp_headwhat-the-file.php:100
actionwp_footerwhat-the-file.php:101
filtertemplate_includewhat-the-file.php:102
actionadmin_bar_menuwhat-the-file.php:103
actionwp_enqueue_scriptswhat-the-file.php:105
actionbp_core_pre_load_templatewhat-the-file.php:109
actionallwhat-the-file.php:113
actionplugins_loadedwhat-the-file.php:337
Maintenance & Trust

What The File Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 19, 2026
PHP min version5.3
Downloads586K

Community Trust

Rating98/100
Number of ratings882
Active installs40K
Developer Profile

What The File Developer Profile

Barry Kooij

8 plugins · 62K total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
1432 days
View full developer profile
Detection Fingerprints

How We Detect What The File

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/what-the-file/assets/images/never5-logo.png
Script Paths
/wp-content/plugins/what-the-file/assets/js/admin-bar-tweaks.js/wp-content/plugins/what-the-file/assets/js/what-the-file.js
Version Parameters
what-the-file/assets/css/admin-bar-tweaks.css?ver=what-the-file/assets/js/admin-bar-tweaks.js?ver=what-the-file/assets/js/what-the-file.js?ver=

HTML / DOM Fingerprints

JS Globals
window.whatTheFile
FAQ

Frequently Asked Questions about What The File