Cache Manifest Security & Risk Analysis

wordpress.org/plugins/cache-manifest

This plugin will cache certain content of your website and will make it available for offline navigation.

10 active installs v1.0 PHP + WP 3+ Updated Oct 3, 2013
cachehtml5manifest
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Cache Manifest Safe to Use in 2026?

Generally Safe

Score 85/100

Cache Manifest has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The cache-manifest plugin v1.0 presents a generally positive security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the plugin utilizes prepared statements for all SQL queries, which is a critical security best practice that mitigates SQL injection risks. There are no recorded vulnerabilities (CVEs) for this plugin, suggesting a history of secure development or a lack of publicly discovered issues.

However, the analysis does reveal some areas of concern. A notable weakness is that 100% of the identified output operations are not properly escaped. This could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not sanitized before being rendered in the browser. The plugin also performs 14 file operations, and without further context on how these are handled, there's a potential for insecure file manipulation or path traversal if inputs are not rigorously validated. The absence of nonce and capability checks, while not directly exploitable due to the lack of entry points, indicates a lack of defense-in-depth that could become a problem if new entry points are added in future versions without proper security considerations.

In conclusion, while the plugin benefits from a small attack surface and secure SQL practices, the unescaped output and potential risks associated with file operations are significant weaknesses that need to be addressed. The lack of historical vulnerabilities is a positive indicator, but it should not lead to complacency, especially given the identified code-level concerns.

Key Concerns

  • Output operations not properly escaped
  • Potential insecure file operations
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Cache Manifest Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Cache Manifest Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
14
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Cache Manifest Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterlanguage_attributescache_manifest_html5.php:33
actionwp_footercache_manifest_html5.php:63
actionsave_postcache_manifest_html5.php:154
actionswitch_themecache_manifest_html5.php:155
Maintenance & Trust

Cache Manifest Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedOct 3, 2013
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Cache Manifest Developer Profile

Gravuj Miklos Henrich

5 plugins · 150 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cache Manifest

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cache-manifest/debugger.js
Script Paths
http://ajax.googleapis.com/ajax/libs/jquery/1.6.1/jquery.min.js

HTML / DOM Fingerprints

CSS Classes
manifest
HTML Comments
Generated by Cache Manifest plugin
Data Attributes
manifest="cache.manifest"
JS Globals
window.jQuery
FAQ

Frequently Asked Questions about Cache Manifest