AutoTweaks Security & Risk Analysis

wordpress.org/plugins/autotweaks

WP Classic Setup: Removes WP version, dashicons, oEmbed, Jquery Migrate, XMLRPC. Set Http security headers, heartbeat to 60s, Post revisions to 1, etc

10 active installs v1.4 PHP + WP 4.2+ Updated Dec 22, 2021
optimizationsettingsspeedtweakswpo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is AutoTweaks Safe to Use in 2026?

Generally Safe

Score 85/100

AutoTweaks has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The autotweaks plugin v1.4 exhibits a generally strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events suggests a minimal attack surface. Furthermore, the code signals indicate the absence of dangerous functions and external HTTP requests, and all SQL queries are properly prepared. This demonstrates good practices in preventing common web vulnerabilities.

However, a significant concern arises from the output escaping. With 100% of outputs not being properly escaped, this creates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Even with a limited attack surface, any user-provided data that is displayed without proper sanitization can be exploited by attackers to inject malicious scripts. The vulnerability history is also clean, which is a positive indicator, but it does not mitigate the immediate risk posed by the unescaped output.

In conclusion, while the plugin is architecturally sound in many areas, the complete lack of output escaping is a critical flaw that necessitates immediate attention. This weakness significantly outweighs the strengths of its limited attack surface and secure SQL handling. Addressing the XSS vulnerability is paramount to ensuring user safety and maintaining the plugin's overall security.

Key Concerns

  • Outputs not properly escaped
Vulnerabilities
None known

AutoTweaks Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

AutoTweaks Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

AutoTweaks Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 19
actionsend_headersautotweaks.php:18
filtershow_recent_comments_widget_styleautotweaks.php:55
filterthe_generatorautotweaks.php:69
filterfallback_intermediate_image_sizesautotweaks.php:78
filterheartbeat_settingsautotweaks.php:86
actionwp_default_scriptsautotweaks.php:103
actionwp_footerautotweaks.php:110
actionwp_print_stylesautotweaks.php:119
actionpre_pingautotweaks.php:127
filterwp_revisions_to_keepautotweaks.php:131
filterxmlrpc_enabledautotweaks.php:143
filterwp_headersautotweaks.php:145
filterxmlrpc_enabledautotweaks.php:153
filterxmlrpc_methodsautotweaks.php:154
filtermanage_posts_columnsautotweaks.php:169
actionmanage_posts_custom_columnautotweaks.php:170
filtermanage_pages_columnsautotweaks.php:171
actionmanage_pages_custom_columnautotweaks.php:172
actionadmin_print_styles-edit-tags.phpautotweaks.php:189
Maintenance & Trust

AutoTweaks Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedDec 22, 2021
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

AutoTweaks Developer Profile

Luis Celadita

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AutoTweaks

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about AutoTweaks