which template file Security & Risk Analysis

wordpress.org/plugins/which-template-file

Show the name of the php file of your theme used to display the current page.

4K active installs v5.2.0 PHP 5.6+ WP 3.3.0+ Updated Feb 2, 2025
adminbardebugtemplatetoolbartpl
91
A · Safe
CVEs total2
Unpatched0
Last CVENov 29, 2023
Download
Safety Verdict

Is which template file Safe to Use in 2026?

Generally Safe

Score 91/100

which template file has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

2 known CVEsLast CVE: Nov 29, 2023Updated 1yr ago
Risk Assessment

The 'which-template-file' plugin version 5.2.0 presents a mixed security posture. On the positive side, it boasts a zero attack surface in terms of AJAX handlers, REST API routes, shortcodes, and cron events, and all identified SQL queries are properly prepared. The presence of a nonce check is also a positive indicator. However, a significant concern arises from the complete lack of output escaping across all 12 identified output points. This suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities, where user-supplied data could be injected into the output and executed by a victim's browser.

The taint analysis reveals one flow with unsanitized paths, which, while not rated as critical or high severity in this analysis, still indicates a potential weakness in how file paths are handled. The plugin's vulnerability history is a major red flag. With two documented medium-severity CVEs in the past, specifically related to XSS and CSRF, the trend points towards recurring input validation and output sanitization issues. The fact that these vulnerabilities were in the past and are currently unpatched according to the data is concerning, though the "currently unpatched: 0" implies they have been addressed. The recurring nature of these vulnerability types, particularly XSS, coupled with the current lack of output escaping, strongly suggests an ongoing risk.

In conclusion, while the plugin has a minimal attack surface and handles SQL securely, the critical weakness in output escaping and the history of XSS and CSRF vulnerabilities create a substantial risk. The taint analysis, though not indicating critical severity, adds to the overall concern regarding input handling. Users should be highly cautious, and developers should prioritize addressing the output escaping deficiency immediately.

Key Concerns

  • All outputs are unescaped
  • Flow with unsanitized paths
  • History of medium severity CVEs (2)
  • Vulnerability types include XSS and CSRF
Vulnerabilities
2 published

which template file Security Vulnerabilities

CVEs by Year

2 CVEs in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2023-49177medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

which template file <= 5.0.0 - Unauthenticated Cross-Site Scripting

Nov 29, 2023 Patched in 5.1 (433d)
CVE-2023-45753medium · 4.3Cross-Site Request Forgery (CSRF)

which template file <= 4.8.0 - Cross-Site Request Forgery

Oct 12, 2023 Patched in 4.9.0 (103d)
Code Analysis
Analyzed Mar 16, 2026

which template file Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped12 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
display_admin_page (admin\add_menu_page.php:100)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

which template file Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actioninitadmin\add_menu_page.php:24
actionadmin_initadmin\add_menu_page.php:25
actionadmin_headadmin\add_menu_page.php:26
actionadmin_menuadmin\add_menu_page.php:27
actionadmin_noticesadmin\add_menu_page.php:61
actionadmin_noticesadmin\add_menu_page.php:66
actionadmin_bar_menuwhich-template-file.php:21
actionwp_headwhich-template-file.php:114
Maintenance & Trust

which template file Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedFeb 2, 2025
PHP min version5.6
Downloads55K

Community Trust

Rating100/100
Number of ratings4
Active installs4K
Developer Profile

which template file Developer Profile

gilles66

3 plugins · 4K total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
268 days
View full developer profile
Detection Fingerprints

How We Detect which template file

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/which-template-file/admin/class_page_admin.php/wp-content/plugins/which-template-file/admin/add_menu_page.php

HTML / DOM Fingerprints

CSS Classes
class_gwp_my_template_file
FAQ

Frequently Asked Questions about which template file