Asynchronous Javascript Security & Risk Analysis

wordpress.org/plugins/asynchronous-javascript

Improve page load performance by asynchronously loading javascript using head.js

200 active installs v1.3.5 PHP + WP 3.5+ Updated Nov 2, 2013
asyncasynchronousheadjsjavascriptjs
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEJan 27, 2026
Safety Verdict

Is Asynchronous Javascript Safe to Use in 2026?

Use With Caution

Score 63/100

Asynchronous Javascript has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Jan 27, 2026Updated 12yr ago
Risk Assessment

The "asynchronous-javascript" plugin version 1.3.5 exhibits a mixed security posture. On the positive side, the static analysis reveals no discernible attack surface in terms of AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all identified SQL queries are correctly using prepared statements, and there are no direct file operations or external HTTP requests, which are common vectors for vulnerabilities. However, a significant concern arises from the complete lack of output escaping, meaning any data rendered to the user interface is potentially vulnerable to Cross-Site Scripting (XSS) attacks. The absence of nonce and capability checks on any potential (though seemingly absent) entry points is also a weakness.

The vulnerability history is particularly alarming. The plugin has a known medium severity CVE related to Cross-site Scripting, and critically, this vulnerability is currently unpatched. This indicates a recurring security issue within the plugin that has not been adequately addressed. The existence of this unpatched vulnerability, coupled with the complete lack of output escaping in the current code, strongly suggests that XSS vulnerabilities are a persistent and unresolved problem for this plugin. While the current code analysis doesn't reveal immediate entry points, the historical context and output escaping issues present a clear and present danger.

Key Concerns

  • Unpatched CVE
  • No output escaping
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
1

Asynchronous Javascript Security Vulnerabilities

CVEs by Year

1 CVE in 2026 · unpatched
2026
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-68846medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Asynchronous Javascript <= 1.3.5 - Reflected Cross-Site Scripting

Jan 27, 2026Unpatched
Code Analysis
Analyzed Mar 16, 2026

Asynchronous Javascript Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

Asynchronous Javascript Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwp_print_scriptsasynchronous-javascript.php:41
filterscript_loader_srcasynchronous-javascript.php:42
filterprint_footer_scriptsasynchronous-javascript.php:43
filterprint_head_scriptsasynchronous-javascript.php:44
actioninitasynchronous-javascript.php:46
Maintenance & Trust

Asynchronous Javascript Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedNov 2, 2013
PHP min version
Downloads36K

Community Trust

Rating74/100
Number of ratings9
Active installs200
Developer Profile

Asynchronous Javascript Developer Profile

Paris Holley

2 plugins · 300 total installs

76
trust score
Avg Security Score
74/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Asynchronous Javascript

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/asynchronous-javascript/js/head.load.min.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Asynchronous Javascript