CDN Rewrites Security & Risk Analysis

wordpress.org/plugins/cdn-rewrites

This plugin rewrites the host(s) of your static files (JavaScripts, CSS, images etc.) (called Origin) into a CDN (Content Delivery Network) host.

10 active installs v1.0.1 PHP + WP 2.2+ Updated Dec 6, 2009
bandwidthcdncontent-delivery-networkrewrites
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CDN Rewrites Safe to Use in 2026?

Generally Safe

Score 85/100

CDN Rewrites has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The 'cdn-rewrites' v1.0.1 plugin presents a mixed security posture. On one hand, it boasts a zero-day attack surface, meaning there are no direct entry points identified through AJAX handlers, REST API routes, shortcodes, or cron events that are not properly authenticated. This is a significant strength, indicating a proactive approach to limiting potential attack vectors. The plugin also makes good use of prepared statements for the majority of its SQL queries and includes a nonce check, which are positive security indicators.

However, there are notable concerns. The presence of two instances of the `unserialize` function is a critical red flag. If user-supplied data is ever passed to `unserialize` without strict validation, it can lead to Remote Code Execution vulnerabilities. The low percentage (27%) of properly escaped output is also worrying, as it suggests a risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the taint analysis revealing four flows with unsanitized paths, while not flagged as critical or high severity, still points to potential issues with how data is processed and could be manipulated. The inclusion of an outdated jQuery library (v1.3.2) is another weakness, as older versions often contain known vulnerabilities.

Despite a clean vulnerability history, the code analysis reveals inherent risks that, if exploited, could lead to serious security breaches. The plugin's strengths lie in its limited attack surface and SQL practices, but these are overshadowed by the dangerous use of `unserialize` and insufficient output escaping. Future development should prioritize sanitizing all inputs before unserialization and ensuring all output is properly escaped.

Key Concerns

  • Dangerous function 'unserialize' found
  • Low percentage of properly escaped output (27%)
  • Taint analysis: 4 flows with unsanitized paths
  • Bundled outdated library: jQuery v1.3.2
  • Capability checks are missing
Vulnerabilities
None known

CDN Rewrites Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

CDN Rewrites Code Analysis

Dangerous Functions
2
Raw SQL Queries
2
10 prepared
Unescaped Output
8
3 escaped
Nonce Checks
1
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

unserialize$p->excludes = unserialize($p->excludes);cdnr.class.php:152
unserialize$p->excludes = unserialize($p->excludes);profile.class.php:205

Bundled Libraries

jQuery1.3.2

SQL Query Safety

83% prepared12 total queries

Output Escaping

27% escaped11 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
edit (profile.class.php:190)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

CDN Rewrites Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionget_headercdn_rewrites.php:21
actionwp_footercdn_rewrites.php:22
actionwp_footercdn_rewrites.php:23
actionadmin_menucdn_rewrites.php:27
actioninitcdn_rewrites.php:28
Maintenance & Trust

CDN Rewrites Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedDec 6, 2009
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

CDN Rewrites Developer Profile

Phoenixheart

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CDN Rewrites

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cdn-rewrites/css/start/jquery-ui-1.7.2.custom.css/wp-content/plugins/cdn-rewrites/css/admin.css

HTML / DOM Fingerprints

CSS Classes
cdnr_dialog
Data Attributes
id="cdnr_dialog"id="generalLoading"
FAQ

Frequently Asked Questions about CDN Rewrites