Triagis Security Evaluation

Triagis Security Evaluation is a simple lite-weight plugin to analyze your current WordPress installation and server config for common security flaws.

Author:Triagis Ltd. (profile at
WordPress version required:3.0.1
WordPress version tested:4.1
Plugin version:1.16
Added to WordPress repository:13-12-2013
Last updated:30-01-2015
Warning! This plugin has not been updated in over 2 years. It may no longer be maintained or supported and may have compatibility issues when used with more recent versions of WordPress.
Rating, %:100
Rated by:2
Plugin URI:
Total downloads:7 878
Active installs:900+
plugin download
Click to start download

WordPress can be easily secured by following a few best security practices. We check your server and WordPress installation for common security vulnerabilities, which you can then address right on the plugin page itself!

Some of the things we check for, which you can fix with a few clicks!

  • Check if thumthumb.php or other scripts exist that are easily exploited
  • Location of your wp-config.php
  • Is mod_security enabled
  • Is SSL for backend enabled
  • What information do you expose
  • Do you currently allow PHP to display errors?
  • What permission does your wp-config file, folders and other files on the server have - are they secure?
  • Is your server software up to date (MySQL,PHP,OS)
  • What database prefix do you use? (1-click Fix available)
  • What is the username of the admin account (1-click Fix available)

Don't Expose WordPress Version Using Our Suggestions

A default WordPress installation will expose your version. Hackers scan sites for exploits and always look for older versions that are still vulnerable. Use our suggestion to remove it

Check Folder Permissions With 1-Click

Most WordPress installations get hacked due to insecure folder permissions. World-writable (777) permissions invite other users to upload files to your server, making it highly vulnerable.

Move Wp-Content Directory

Most WordPress installations use a folder called wp-content and a subdirectory "uploads". If you want to make it a little more difficult for possible automated attacks to succeed you might want to consider changing your wp-content directory name. With our plugin you can do that with a few clicks. NOTE: This is intended for development environments and not production sites. We do not recommend to try this on your live sites.

Why TimThumb Poses A Security Threat

On all servers that host WordPress sites you will have automated scans for a file called timthumb.php or a variation of other names that are targeting exactly this file. Why? Because timthumb.php is very easy to exploit if you set the wrong file and folder permissions. If your server is mis-configured, timthumb.php poses a significant threat to your site and server. That's why we recommend that beginners try to locate plugins that make use of this script and try to find alternatives. An alternative approach is to move the timthumb.php outside the public folders.

Future Versions

Planned for future versions is a dashboard widget with important information at a glance and additional security checks

Add improved way to check for TimThumb

Further Reading

For more info, check out the following articles and videos: