Template Manager by WordPress Monsters Security & Risk Analysis

wordpress.org/plugins/wpm-template-manager

This is a temlate manager plugin for easy WordPress development from scratch when you are use Page Builders plugins.

10 active installs v1.1.0 PHP + WP 3.1.0+ Updated May 17, 2017
customizationlayouttemplate
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Template Manager by WordPress Monsters Safe to Use in 2026?

Generally Safe

Score 85/100

Template Manager by WordPress Monsters has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "wpm-template-manager" plugin v1.1.0 demonstrates a generally strong security posture based on the provided static analysis. The complete absence of dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), file operations, and external HTTP requests are significant strengths. Furthermore, the plugin has no recorded CVEs, indicating a history of relative security. The presence of nonce checks, albeit limited, is also a positive sign. However, a concerning area is the very low percentage of properly escaped output (18%). This suggests a significant risk of Cross-Site Scripting (XSS) vulnerabilities, where user-supplied data, if not properly handled, could be injected into the output displayed to users. While taint analysis found no critical or high severity flows, the low output escaping rate is a pervasive concern that could lead to exploitable vulnerabilities in various scenarios, especially if any user input is reflected directly in the frontend or admin area without adequate sanitization.

Despite the low output escaping, the overall security is decent due to the lack of other common vulnerabilities and a clean history. The primary weakness lies in the potential for XSS due to insufficient output sanitization. The absence of a large attack surface (no AJAX handlers, REST API routes, shortcodes, or cron events without auth checks) further bolsters its security. The plugin's strengths in preventing SQL injection and other common attack vectors are notable, but the XSS risk due to poor output escaping should not be overlooked and warrants attention for future updates.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Template Manager by WordPress Monsters Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Template Manager by WordPress Monsters Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
3 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

18% escaped17 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
wpm_admin_template_manager_settings_page (includes\options-page.php:17)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Template Manager by WordPress Monsters Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actionadmin_enqueue_scriptsincludes\enqueues.php:12
actionadd_meta_boxesincludes\meta-box.php:11
actionsave_postincludes\meta-box.php:41
actionadmin_menuincludes\options-page.php:15
filterpost_updated_messagesincludes\post-type-template.php:61
filterbulk_post_updated_messagesincludes\post-type-template.php:79
actionadmin_noticeswpm-template-manager.php:43
actionget_headerwpm-template-manager.php:101
actionget_headerwpm-template-manager.php:104
actionget_footerwpm-template-manager.php:116
filterdefault_contentwpm-template-manager.php:129
Maintenance & Trust

Template Manager by WordPress Monsters Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedMay 17, 2017
PHP min version
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Template Manager by WordPress Monsters Developer Profile

WordPress Monsters

4 plugins · 130 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Template Manager by WordPress Monsters

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpm-template-manager/assets/css/admin-template-manager.css

HTML / DOM Fingerprints

CSS Classes
debug-toolnotice-success
Shortcode Output
[wpm-template-content]
FAQ

Frequently Asked Questions about Template Manager by WordPress Monsters