CloudFlare Rocket Loader Ignore Security & Risk Analysis

wordpress.org/plugins/cloudflare-rocket-loader-ignore

Instruct CloudFlare's Rocket Loader to ignore specific scripts.

20 active installs v0.0.6 PHP + WP 3.5+ Updated Aug 20, 2014
cloudflareignorejavascriptrocket-loaderscript
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CloudFlare Rocket Loader Ignore Safe to Use in 2026?

Generally Safe

Score 85/100

CloudFlare Rocket Loader Ignore has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "cloudflare-rocket-loader-ignore" plugin v0.0.6 exhibits a generally good security posture based on the provided static analysis and vulnerability history. The absence of any known CVEs and the lack of discovered critical or high-severity taint flows are significant strengths. The plugin also utilizes prepared statements for its SQL queries, which is a best practice. However, a notable concern arises from the complete lack of output escaping. With 20 total outputs analyzed and 0% properly escaped, this presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the user interface.

The plugin's attack surface is minimal, with no identified AJAX handlers, REST API routes, shortcodes, or cron events. This limited entry point profile is positive. The presence of capability checks, though not explicitly tied to any potentially vulnerable functions, is also a good sign that some level of access control is considered. The vulnerability history, being completely clear, suggests a well-maintained codebase or a lack of discovery of past issues. Despite the strengths in its attack surface and vulnerability history, the critical failure in output escaping makes the plugin vulnerable to common web attacks that could impact users and the integrity of the website.

Key Concerns

  • 0% of outputs properly escaped
Vulnerabilities
None known

CloudFlare Rocket Loader Ignore Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

CloudFlare Rocket Loader Ignore Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
20
0 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped20 total outputs
Attack Surface

CloudFlare Rocket Loader Ignore Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actioninitcfrli.php:126
actionadmin_initcfrli.php:133
actionadmin_menucfrli.php:149
filterclean_urlcfrli.php:210
actionwp_print_scriptscfrli.php:211
actionprint_head_scriptscfrli.php:212
actionprint_footer_scriptscfrli.php:213
actionadmin_noticescfrli.php:282
actionadmin_headcfrli.php:303
filterplugin_row_metacfrli.php:320
Maintenance & Trust

CloudFlare Rocket Loader Ignore Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedAug 20, 2014
PHP min version
Downloads5K

Community Trust

Rating84/100
Number of ratings10
Active installs20
Developer Profile

CloudFlare Rocket Loader Ignore Developer Profile

jp2112

14 plugins · 1K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CloudFlare Rocket Loader Ignore

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cloudflare-rocket-loader-ignore/js/cfrli-admin.js/wp-content/plugins/cloudflare-rocket-loader-ignore/css/cfrli-admin.css
Version Parameters
cloudflare-rocket-loader-ignore/js/cfrli-admin.js?ver=cloudflare-rocket-loader-ignore/css/cfrli-admin.css?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- borrowed from https://wordpress.org/plugins/html-cleanup/ -->
Data Attributes
data-cfasync="false"
FAQ

Frequently Asked Questions about CloudFlare Rocket Loader Ignore