Clean Expired Transients Security & Risk Analysis

wordpress.org/plugins/clean-expired-transients

Safest and simplest transients garbage collector.

10 active installs v1.2 PHP 5.2.4+ WP 4.0+ Updated Feb 24, 2019
transienttransients
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Clean Expired Transients Safe to Use in 2026?

Generally Safe

Score 85/100

Clean Expired Transients has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The plugin "clean-expired-transients" v1.2 presents a strong security posture based on the provided static analysis. The absence of any identified entry points such as AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code exhibits good security practices by not utilizing dangerous functions, performing all SQL queries using prepared statements, and ensuring 100% of output is properly escaped. The lack of file operations and external HTTP requests further reinforces this secure design. The complete absence of vulnerability history, including known CVEs, is a positive indicator of its past reliability.

While the static analysis shows no critical or high-severity issues, the complete lack of any capability checks or nonce checks across all entry points (even though there are zero entry points) represents a potential area for concern if the plugin were to introduce them in the future without proper security considerations. However, given the current state of zero entry points, this is a theoretical rather than immediate risk. The vulnerability history being completely clean is an excellent sign, suggesting the developers have a good track record or the plugin has not been a target. Overall, "clean-expired-transients" v1.2 appears to be a securely developed plugin with minimal to no immediate security risks.

Key Concerns

  • No capability checks implemented
  • No nonce checks implemented
Vulnerabilities
None known

Clean Expired Transients Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Clean Expired Transients Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries
Attack Surface

Clean Expired Transients Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_scheduled_deleteclean-expired-transients.php:43
actionplugins_loadedclean-expired-transients.php:151
Maintenance & Trust

Clean Expired Transients Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.22
Last updatedFeb 24, 2019
PHP min version5.2.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Clean Expired Transients Developer Profile

Milan Dinić

20 plugins · 48K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Clean Expired Transients

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Clean Expired Transients