
What The File Security & Risk Analysis
wordpress.org/plugins/what-the-fileWhat The File is the best tool to find out what template parts are used to display the page you're currently viewing!
Is What The File Safe to Use in 2026?
Generally Safe
Score 100/100What The File has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'what-the-file' v1.6.1 plugin exhibits a strong security posture regarding its attack surface and known vulnerabilities. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly reduces the potential entry points for attackers. Furthermore, the plugin has no recorded CVEs, indicating a history of responsible development or minimal public exposure of vulnerabilities. The code analysis also shows a positive sign with 100% of SQL queries utilizing prepared statements, a crucial practice for preventing SQL injection. The presence of capability checks (3) is also a good indicator of access control being considered.
However, there are significant concerns regarding output escaping. With 2 total outputs and 0% properly escaped, this indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that originates from user input or external sources without proper sanitization and escaping is a direct pathway for XSS attacks. The taint analysis, while reporting no critical or high severity flows, might not be capturing potential XSS if the output escaping is universally poor. The lack of nonce checks on any potential entry points (though none are apparent, this is a general concern for any plugin interacting with the frontend or backend) is also a missed opportunity for preventing Cross-Site Request Forgery (CSRF).
In conclusion, while the plugin benefits from a small attack surface and a clean vulnerability history, the complete lack of output escaping is a severe weakness that overshadows these strengths. This single flaw presents a clear and present danger of XSS vulnerabilities, which can lead to session hijacking, defacement, and other malicious activities. Developers must prioritize implementing proper output escaping mechanisms immediately.
Key Concerns
- 0% output escaping
What The File Security Vulnerabilities
What The File Code Analysis
Output Escaping
Data Flow Analysis
What The File Attack Surface
WordPress Hooks 12
Maintenance & Trust
What The File Maintenance & Trust
Maintenance Signals
Community Trust
What The File Alternatives
Show Current Template
show-current-template
A WordPress plugin which shows the current template file name, the current theme name and included template files' name in the tool bar.
which template file
which-template-file
Show the name of the php file of your theme used to display the current page.
What Template
what-template
Adds the current page's template name to the admin bar.
Category Template Hierarchy
category-template-hierarchy
Adds parent-category.php, child-category.php, and child-category-{slug|id} templates to the hierarchy and conditional tags to match.
What Template Am I Using
what-template-am-i-using
This plugin is intended for theme developers to use. It shows the current template being used to render the page, current post type, and much more.
What The File Developer Profile
8 plugins · 62K total installs
How We Detect What The File
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/what-the-file/assets/images/never5-logo.png/wp-content/plugins/what-the-file/assets/js/admin-bar-tweaks.js/wp-content/plugins/what-the-file/assets/js/what-the-file.jswhat-the-file/assets/css/admin-bar-tweaks.css?ver=what-the-file/assets/js/admin-bar-tweaks.js?ver=what-the-file/assets/js/what-the-file.js?ver=HTML / DOM Fingerprints
window.whatTheFile