Batcache Security & Risk Analysis

wordpress.org/plugins/batcache

Batcache uses Memcached to store and serve rendered pages.

800 active installs v1.5 PHP + WP 3.2+ Updated Mar 28, 2020
cachememcachememcachedperformancespeed
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Batcache Safe to Use in 2026?

Generally Safe

Score 85/100

Batcache has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The batcache plugin v1.5 exhibits a generally positive security posture based on the provided static analysis and vulnerability history. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface, with no identified entry points lacking authentication. Furthermore, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are common vectors for vulnerabilities. The lack of known CVEs and a clean vulnerability history further reinforces this strong security foundation, suggesting a history of well-maintained and secure code.

However, a notable concern arises from the presence of a single instance of the `create_function` dangerous function. While the static analysis did not identify any taint flows or unsanitized paths, the use of `create_function` can be risky as it can lead to code injection vulnerabilities if its input is not strictly controlled and sanitized, especially in older PHP versions or specific contexts. Additionally, the output escaping is only 67% proper, indicating that some data outputted by the plugin might not be sufficiently escaped, potentially opening the door for cross-site scripting (XSS) attacks if the data originates from user input or untrusted sources.

In conclusion, batcache v1.5 appears to be a secure plugin with a strong emphasis on limiting its attack surface and employing secure coding practices for database interactions. The clean vulnerability history is a significant strength. The primary areas for improvement lie in addressing the use of `create_function` and ensuring all output is properly escaped to mitigate potential XSS risks, thereby enhancing its overall security.

Key Concerns

  • Use of dangerous function: create_function
  • Output escaping is not fully proper (33% unescaped)
Vulnerabilities
None known

Batcache Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Batcache Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
1
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_function$fun = create_function('', $function);advanced-cache.php:281

Output Escaping

67% escaped3 total outputs
Attack Surface

Batcache Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterstatus_headeradvanced-cache.php:578
filterwp_redirect_statusadvanced-cache.php:579
actionclean_post_cachebatcache.php:18
Maintenance & Trust

Batcache Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedMar 28, 2020
PHP min version
Downloads113K

Community Trust

Rating90/100
Number of ratings2
Active installs800
Developer Profile

Batcache Developer Profile

Automattic

213 plugins · 19.2M total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
1384 days
View full developer profile
Detection Fingerprints

How We Detect Batcache

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- nananananananananananananananana BATCACHE!!! --><!-- If you see this, Batcache is not enabled. -->
FAQ

Frequently Asked Questions about Batcache