
CDN Rewrites Security & Risk Analysis
wordpress.org/plugins/cdn-rewritesThis plugin rewrites the host(s) of your static files (JavaScripts, CSS, images etc.) (called Origin) into a CDN (Content Delivery Network) host.
Is CDN Rewrites Safe to Use in 2026?
Generally Safe
Score 85/100CDN Rewrites has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'cdn-rewrites' v1.0.1 plugin presents a mixed security posture. On one hand, it boasts a zero-day attack surface, meaning there are no direct entry points identified through AJAX handlers, REST API routes, shortcodes, or cron events that are not properly authenticated. This is a significant strength, indicating a proactive approach to limiting potential attack vectors. The plugin also makes good use of prepared statements for the majority of its SQL queries and includes a nonce check, which are positive security indicators.
However, there are notable concerns. The presence of two instances of the `unserialize` function is a critical red flag. If user-supplied data is ever passed to `unserialize` without strict validation, it can lead to Remote Code Execution vulnerabilities. The low percentage (27%) of properly escaped output is also worrying, as it suggests a risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the taint analysis revealing four flows with unsanitized paths, while not flagged as critical or high severity, still points to potential issues with how data is processed and could be manipulated. The inclusion of an outdated jQuery library (v1.3.2) is another weakness, as older versions often contain known vulnerabilities.
Despite a clean vulnerability history, the code analysis reveals inherent risks that, if exploited, could lead to serious security breaches. The plugin's strengths lie in its limited attack surface and SQL practices, but these are overshadowed by the dangerous use of `unserialize` and insufficient output escaping. Future development should prioritize sanitizing all inputs before unserialization and ensuring all output is properly escaped.
Key Concerns
- Dangerous function 'unserialize' found
- Low percentage of properly escaped output (27%)
- Taint analysis: 4 flows with unsanitized paths
- Bundled outdated library: jQuery v1.3.2
- Capability checks are missing
CDN Rewrites Security Vulnerabilities
CDN Rewrites Code Analysis
Dangerous Functions Found
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
CDN Rewrites Attack Surface
WordPress Hooks 5
Maintenance & Trust
CDN Rewrites Maintenance & Trust
Maintenance Signals
Community Trust
CDN Rewrites Alternatives
bunny.net – WordPress CDN Plugin
bunnycdn
Enable Bunny CDN to speed up your WordPress website and enjoy greatly improved loading times around the world.
Gcore CDN
g-core-labs-cdn
Gcore Plugin
RocketCDN – WordPress CDN Plugin
rocketcdn
RocketCDN plugin is the easiest WordPress CDN plugin. It automatically rewrites all URLs to be served by our content delivery network (CDN).
powerwaf.com – WordPress WAF & CDN Plugin
powerwaf-cdn
Accelerate and protect your website to the maximum with PowerWAF CDN. With this plugin you can keep dynamic content updated at the edge to increase de …
CDN Enabler
cdn-enabler
A content delivery network (CDN) integration plugin for WordPress that rewrites URLs, like for CSS, JavaScript, and images, to be served by a CDN.
CDN Rewrites Developer Profile
3 plugins · 30 total installs
How We Detect CDN Rewrites
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/cdn-rewrites/css/start/jquery-ui-1.7.2.custom.css/wp-content/plugins/cdn-rewrites/css/admin.cssHTML / DOM Fingerprints
cdnr_dialogid="cdnr_dialog"id="generalLoading"