Wolf Library Templates Security & Risk Analysis

wordpress.org/plugins/wolf-library-templates

Setup your site with Elementor Library Templates by one click install

0 active installs v1.0.0 PHP 5.3+ WP 4.6+ Updated Nov 19, 2021
elementor-librarytemplate-library
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Wolf Library Templates Safe to Use in 2026?

Generally Safe

Score 85/100

Wolf Library Templates has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "wolf-library-templates" plugin v1.0.0 exhibits a generally positive security posture with several good practices in place. The static analysis shows no identified REST API routes, shortcodes, cron events, or file operations, significantly reducing the overall attack surface. All SQL queries are properly prepared, and there are no external HTTP requests, further bolstering its security. However, a key concern is the presence of two "unserialize" dangerous function calls. While the analysis shows no immediate exploitable flows with unsanitized paths in the taint analysis, the use of unserialize without stringent validation can be a significant vulnerability if the serialized data originates from an untrusted source.

The plugin also lacks any nonce checks on its AJAX handlers. Although there are capability checks present, the absence of nonces makes these handlers potentially susceptible to Cross-Site Request Forgery (CSRF) attacks if they perform sensitive actions. The output escaping is at a moderate level (65%), indicating that a portion of the output might not be properly sanitized, potentially leading to Cross-Site Scripting (XSS) vulnerabilities in certain scenarios. The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive indicator of past development efforts focused on security, but this does not negate the identified risks in the current version.

In conclusion, the "wolf-library-templates" plugin has a strong foundation with many security best practices observed. The absence of common vulnerabilities and a clean history are commendable. However, the identified use of "unserialize" and the lack of nonce checks on AJAX handlers represent significant areas of concern that require immediate attention. Addressing these specific weaknesses will greatly enhance the plugin's security and mitigate potential risks.

Key Concerns

  • Unserialize function found
  • Missing nonce check on AJAX
  • Moderate output escaping (35% not escaped)
Vulnerabilities
None known

Wolf Library Templates Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Wolf Library Templates Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
16
30 escaped
Nonce Checks
0
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$unserialized = @unserialize($value);classes\post.php:101
unserialize$unserialized = unserialize($value);classes\post.php:124

Output Escaping

65% escaped46 total outputs
Attack Surface

Wolf Library Templates Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_wolf_demo_importer_actionfunc\helpers.php:147
noprivwp_ajax_wolf_demo_importer_actionfunc\helpers.php:148
WordPress Hooks 5
actionadmin_menuclasses\admin.php:15
filterwolf_demo_importer_get_data_filefunc\library.php:16
filterwolf_lt_demo_listsfunc\library.php:42
actioninitmain.php:22
actionadmin_enqueue_scriptsmain.php:23
Maintenance & Trust

Wolf Library Templates Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedNov 19, 2021
PHP min version5.3
Downloads848

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Wolf Library Templates Developer Profile

wolfcoding

4 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Wolf Library Templates

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wolf-library-templates/assets/css/style.css/wp-content/plugins/wolf-library-templates/assets/js/vendor/sweetalert2/sweetalert2.all.min.js/wp-content/plugins/wolf-library-templates/assets/js/vendor/isotope/isotope.pkgd.min.js/wp-content/plugins/wolf-library-templates/assets/js/core.js/wp-content/plugins/wolf-library-templates/assets/js/script.js
Script Paths
/wp-content/plugins/wolf-library-templates/assets/js/vendor/sweetalert2/sweetalert2.all.min.js/wp-content/plugins/wolf-library-templates/assets/js/vendor/isotope/isotope.pkgd.min.js/wp-content/plugins/wolf-library-templates/assets/js/core.js/wp-content/plugins/wolf-library-templates/assets/js/script.js

HTML / DOM Fingerprints

CSS Classes
wolf-bodywolf-contentwolf-headerwolf-filter-headerwolf-filter-tabswolf-typeswolf-filter-groupwolf-filter-btn-active+3 more
Data Attributes
data-filter-groupdata-filter
JS Globals
adiL10n
FAQ

Frequently Asked Questions about Wolf Library Templates