CleanerPress Security & Risk Analysis

wordpress.org/plugins/cleanerpress

Every admin wants to have their website loaded as fast as possible.CleanerPress tries to give you some more control over what is outputted to the user

10 active installs v2.0.1 PHP + WP 3.0+ Updated Aug 6, 2013
cachecssminifyperformancespeed
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CleanerPress Safe to Use in 2026?

Generally Safe

Score 85/100

CleanerPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The cleanerpress plugin version 2.0.1 presents a mixed security posture. On the positive side, it has a very small attack surface with only one AJAX handler and no REST API routes, shortcodes, or cron events. Crucially, this single entry point appears to have authentication checks, which is a good practice. Furthermore, there are no recorded vulnerabilities (CVEs) for this plugin, and the taint analysis shows no concerning flows, suggesting a generally safe code base.

However, there are several areas for concern. The presence of the `create_function` is a significant red flag, as it can be used in insecure ways and is deprecated. The static analysis also reveals that a substantial portion of SQL queries are not using prepared statements, increasing the risk of SQL injection. Additionally, a significant issue is the complete lack of proper output escaping, meaning any data outputted by the plugin is vulnerable to cross-site scripting (XSS) attacks. While the plugin has nonce and capability checks, their application needs to be tied to the identified risks.

Given the lack of historical vulnerabilities and the small attack surface, the immediate risk might seem low. However, the identified coding issues, particularly the unescaped output and raw SQL queries, introduce tangible vulnerabilities that could be exploited. The plugin exhibits a weakness in secure coding practices despite its clean vulnerability history and limited entry points.

Key Concerns

  • Dangerous function create_function used
  • High percentage of SQL queries not prepared
  • No output escaping detected
Vulnerabilities
None known

CleanerPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

CleanerPress Code Analysis

Dangerous Functions
1
Raw SQL Queries
7
1 prepared
Unescaped Output
27
0 escaped
Nonce Checks
2
Capability Checks
2
File Operations
4
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_filter( 'pre_site_transient_update_plugins', create_function( '$a', "return null;" ) );cleanerpress-professional-3.php:36

SQL Query Safety

13% prepared8 total queries

Output Escaping

0% escaped27 total outputs
Attack Surface

CleanerPress Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_cpr_exec_queryadmin_ajax.php:5
WordPress Hooks 13
filterpre_site_transient_update_pluginscleanerpress-professional-3.php:36
actionwp_enqueue_scriptscleanerpress-professional-3.php:52
actionwp_headcleanerpress-professional-3.php:53
actionwp_print_stylescleanerpress-professional-3.php:56
actionwp_enqueue_scriptscleanerpress-professional-3.php:61
filterscript_loader_srccleanerpress-professional-3.php:65
filterstyle_loader_srccleanerpress-professional-3.php:66
actionadd_meta_boxescpr_meta_boxes.php:5
actionsave_postcpr_meta_boxes.php:6
actionadmin_inito_tld.php:9
actionadmin_enqueue_scriptsp_options.php:16
actionadmin_menup_options.php:18
actioninitselective_plugin_dhk.php:8
Maintenance & Trust

CleanerPress Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedAug 6, 2013
PHP min version
Downloads8K

Community Trust

Rating96/100
Number of ratings5
Active installs10
Developer Profile

CleanerPress Developer Profile

Arevico

4 plugins · 110 total installs

76
trust score
Avg Security Score
74/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CleanerPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cleanerpress/front/head.min.js/wp-content/arevico-css-cache/
Script Paths
/wp-content/plugins/cleanerpress/front/head.min.js

HTML / DOM Fingerprints

JS Globals
clean_press_plugin_doscripts_headjscpr_arev_optscripts_data
FAQ

Frequently Asked Questions about CleanerPress