Clear CloudFront Cache Security & Risk Analysis

wordpress.org/plugins/clear-cloudfront-cache

Clear CloudFront Cache

30 active installs v1.0.0 PHP 7.0+ WP 6.1.1+ Updated Apr 1, 2023
awscloudfront
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Clear CloudFront Cache Safe to Use in 2026?

Generally Safe

Score 85/100

Clear CloudFront Cache has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "clear-cloudfront-cache" plugin version 1.0.0 exhibits a generally good security posture with several strong practices in place. The absence of any recorded vulnerabilities in its history, coupled with 100% usage of prepared statements for SQL queries and proper output escaping, are significant strengths. The plugin also demonstrates good input validation by having zero unsanitized paths identified in taint analysis, suggesting a low risk of injection-based attacks. Furthermore, the limited attack surface with no exposed AJAX handlers, REST API routes, or shortcodes without proper checks is commendable.

However, there are notable areas for concern. The presence of 12 instances of the `unserialize` function is a significant risk. Unserialization of untrusted user input can lead to Remote Code Execution (RCE) or denial-of-service attacks if not handled with extreme caution and strict validation of the unserialized data. While no capability checks were explicitly found on entry points, the limited attack surface might mitigate this risk in this specific version. The bundling of Guzzle, a third-party library, also presents a potential risk if it's an outdated version, which could introduce vulnerabilities from the library itself. The single nonce check is also minimal given the potential for attacks if multiple actions are handled without proper CSRF protection.

Overall, the plugin is built on a relatively secure foundation with good practices in core areas like database interaction and output handling. The historical lack of vulnerabilities is a positive sign. However, the heavy reliance on `unserialize` without further context on how it's used or protected is a substantial security weakness that needs immediate attention. The potential for a bundled, outdated library also warrants investigation. A future assessment should focus on the specific usage of `unserialize` and the version of the Guzzle library.

Key Concerns

  • Use of unserialize function (12 instances)
  • Bundled library (Guzzle)
  • Limited nonce checks (1 total)
  • No capability checks on entry points
Vulnerabilities
None known

Clear CloudFront Cache Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Clear CloudFront Cache Code Analysis

Dangerous Functions
12
Raw SQL Queries
0
7 prepared
Unescaped Output
0
9 escaped
Nonce Checks
1
Capability Checks
0
File Operations
67
External Requests
2
Bundled Libraries
1

Dangerous Functions Found

unserialize$data = unserialize($serialized);aws\Aws\Common\Model\MultipartUpload\AbstractTransferState.php:155
unserialize$this->loadData(unserialize($serialized));aws\Aws\Common\Model\MultipartUpload\AbstractUploadId.php:68
unserialize$this->loadData(unserialize($serialized));aws\Aws\Common\Model\MultipartUpload\AbstractUploadPart.php:81
unserialize$data = unserialize($serialized);aws\Aws\Glacier\Model\MultipartUpload\UploadPartGenerator.php:196
unserializereturn unserialize($data);aws\Doctrine\Common\Cache\FilesystemCache.php:68
unserializereturn unserialize($document[self::DATA_FIELD]->bin);aws\Doctrine\Common\Cache\MongoDBCache.php:95
unserializereturn unserialize($object->getContent());aws\Doctrine\Common\Cache\RiakCache.php:79
unserializereturn $this->doContains($id) ? unserialize(xcache_get($id)) : false;aws\Doctrine\Common\Cache\XcacheCache.php:40
unserializeforeach (unserialize($manifest) as $entry) {aws\Guzzle\Plugin\Cache\DefaultCacheStorage.php:57
unserializeforeach (unserialize($entries) as $entry) {aws\Guzzle\Plugin\Cache\DefaultCacheStorage.php:92
unserialize$entries = unserialize($entries);aws\Guzzle\Plugin\Cache\DefaultCacheStorage.php:117
unserialize$meta = unserialize(file_get_contents($metadata));aws\Symfony\Component\ClassLoader\ClassCollectionLoader.php:71

Bundled Libraries

Guzzle

SQL Query Safety

100% prepared7 total queries

Output Escaping

100% escaped9 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
save_config (cloufront-cache-clear.php:81)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Clear CloudFront Cache Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitcloufront-cache-clear.php:13
actionadmin_menucloufront-cache-clear.php:36
actionadmin_initcloufront-cache-clear.php:39
Maintenance & Trust

Clear CloudFront Cache Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedApr 1, 2023
PHP min version7.0
Downloads862

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

Clear CloudFront Cache Developer Profile

yamaimo

1 plugin · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Clear CloudFront Cache

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<div class="wrap"> <h1>Clear CloudFront Cache</h1> <form action="" method='post' id="my-submenu-form"> <p> <label for="title">ディストリビューションID:</label> <input type="text" name="distribute" value=""/> </p> <p><input type='submit' value='保存' class='button button-primary button-large' name='save'></p> <p><input type='submit' value='キャッシュクリア' class='button button-primary button-large' name='clear'></p> </form> </div>
FAQ

Frequently Asked Questions about Clear CloudFront Cache