Cachebuster Security & Risk Analysis

wordpress.org/plugins/cachebuster

Stop force refreshing or clearing your browsers cache by preventing caching of stale files.

1K active installs v1.8 PHP 5.6+ WP 4.4+ Updated Oct 28, 2024
cachecache-bustingcachebustermodification-timetimestamp
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Cachebuster Safe to Use in 2026?

Generally Safe

Score 92/100

Cachebuster has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The static analysis of "cachebuster" v1.8 reveals an exceptionally clean codebase with no identified attack surface points such as unprotected AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code demonstrates excellent security practices by avoiding dangerous functions, utilizing prepared statements for all SQL queries, and performing proper output escaping. There are no file operations or external HTTP requests, and crucially, no unpatched vulnerabilities or recorded CVEs exist for this plugin. This indicates a strong focus on secure coding principles and a well-maintained plugin with respect to known security issues.

While the absence of identified vulnerabilities and attack vectors is highly positive, it is important to note that the static analysis did not identify any taint flows. This could be due to the plugin's simplicity or the specific analysis tools used. The complete lack of nonces and capability checks on entry points is also a potential area for concern, as it implies that any future expansion or unforeseen interaction could introduce vulnerabilities if these checks are not implemented. However, given the current zero attack surface, this is a theoretical risk rather than an immediate one. The plugin's history of zero vulnerabilities is a significant strength, suggesting a mature and secure development process.

Key Concerns

  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Cachebuster Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Cachebuster Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Cachebuster Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterstyle_loader_srccachebuster.php:51
filterscript_loader_srccachebuster.php:52
Maintenance & Trust

Cachebuster Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedOct 28, 2024
PHP min version5.6
Downloads13K

Community Trust

Rating100/100
Number of ratings6
Active installs1K
Developer Profile

Cachebuster Developer Profile

Albert Peschar

2 plugins · 11K total installs

74
trust score
Avg Security Score
93/100
Avg Patch Time
521 days
View full developer profile
Detection Fingerprints

How We Detect Cachebuster

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cachebuster/
Version Parameters
?=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Cachebuster