Zilla Portfolio Security & Risk Analysis

wordpress.org/plugins/zillaportfolio

A complete portfolio plugin for creative folks

400 active installs v1.0 PHP + WP 3.5+ Updated Mar 31, 2016
custom-post-typecustom-taxonomyportfoliotheme-zillathemezilla
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Zilla Portfolio Safe to Use in 2026?

Generally Safe

Score 85/100

Zilla Portfolio has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The zillaportfolio plugin v1.0 exhibits a generally strong security posture based on the provided static analysis. The plugin has a minimal attack surface, with only one AJAX handler, and importantly, this handler appears to have authentication checks, along with two nonce and capability checks, indicating a good practice for securing entry points. The complete absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests further bolsters its security. Additionally, the high percentage of properly escaped output is a positive sign for preventing cross-site scripting (XSS) vulnerabilities. The lack of any recorded historical vulnerabilities or CVEs suggests a mature and well-maintained codebase, or at least one that has not been a target or had publicly disclosed issues. However, the analysis for taint flows was zero, which, while indicating no found issues, could also mean the analysis tools were not configured or capable of detecting all potential flows. It's also worth noting that while most outputs are escaped, a small percentage are not, which could still represent a minor risk if those outputs handle user-supplied data. Overall, the plugin appears secure, with good adherence to common WordPress security best practices, but a thorough taint analysis and review of the unescaped outputs would be beneficial for complete assurance.

Key Concerns

  • Outputs not properly escaped
Vulnerabilities
None known

Zilla Portfolio Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Zilla Portfolio Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
33 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

77% escaped43 total outputs
Attack Surface

Zilla Portfolio Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_tzp_save_gallery_imagesincludes\admin\metaboxes.php:116
WordPress Hooks 23
filtermanage_edit-portfolio_sortable_columnsincludes\admin\admin.php:20
actionmanage_portfolio_posts_custom_columnincludes\admin\admin.php:38
actionmanage_edit-portfolio_columnsincludes\admin\admin.php:49
filterpre_get_postsincludes\admin\admin.php:68
filtermanage_portfolio_posts_columnsincludes\admin\admin.php:84
actionadd_meta_boxesincludes\admin\metaboxes.php:34
actionsave_postincludes\admin\metaboxes.php:89
filtertzp_metabox_save_htmlincludes\admin\metaboxes.php:157
filtertzp_metabox_save_urlincludes\admin\metaboxes.php:167
filtertzp_metabox_save_checkboxincludes\admin\metaboxes.php:178
filtertzp_metabox_save_imagesincludes\admin\metaboxes.php:188
actiontzp_portfolio_settings_meta_box_fieldsincludes\admin\metaboxes.php:336
actiontzp_portfolio_gallery_meta_box_fieldsincludes\admin\metaboxes.php:371
actiontzp_portfolio_audio_meta_box_fieldsincludes\admin\metaboxes.php:417
actiontzp_portfolio_video_meta_box_fieldsincludes\admin\metaboxes.php:484
filterthe_contentincludes\functions.php:76
filterthe_contentincludes\functions.php:113
actionwp_headincludes\functions.php:197
actionpre_get_postsincludes\functions.php:212
actioninitincludes\portfolio-post-type.php:67
actioninitincludes\portfolio-type-taxonomy.php:61
actionwp_enqueue_scriptsincludes\scripts.php:28
actionadmin_enqueue_scriptsincludes\scripts.php:61
Maintenance & Trust

Zilla Portfolio Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedMar 31, 2016
PHP min version
Downloads14K

Community Trust

Rating100/100
Number of ratings2
Active installs400
Developer Profile

Zilla Portfolio Developer Profile

marksouthard

1 plugin · 400 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Zilla Portfolio

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/zillaportfolio/assets/css/admin.css/wp-content/plugins/zillaportfolio/assets/js/admin.js
Script Paths
/wp-content/plugins/zillaportfolio/assets/js/admin.js
Version Parameters
zilla-portfolio/assets/css/admin.css?ver=zilla-portfolio/assets/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
portfolio-media
Data Attributes
data-insert-textdata-create-gallery-textdata-edit-gallery-textdata-save-gallery-textdata-saving-gallery-text
JS Globals
zillaportfolio
Shortcode Output
<div class="portfolio-media">
FAQ

Frequently Asked Questions about Zilla Portfolio