Core Files Update Cleanup Security & Risk Analysis

wordpress.org/plugins/core-files-update-cleanup

This plugin deletes the unnecessary license.txt, readme.html and wp-config-sample.php files after a core update.

20 active installs v1.1.0 PHP + WP 3.6.0+ Updated Jan 23, 2024
cleanupcoreupdate
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Core Files Update Cleanup Safe to Use in 2026?

Generally Safe

Score 85/100

Core Files Update Cleanup has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The plugin "core-files-update-cleanup" v1.1.0 exhibits a strong static security posture. The absence of any identified dangerous functions, unsanitized taint flows, raw SQL queries, and the consistent use of prepared statements for the single SQL query are positive indicators. Furthermore, all output appears to be properly escaped, and there are no external HTTP requests, which minimizes risks related to code injection and cross-site scripting. The plugin also demonstrates good practices by not bundling external libraries, thus avoiding potential vulnerabilities from outdated dependencies.

However, the most significant concern is the complete lack of any security checks, including nonce checks, capability checks, and authentication checks on its entry points. While the current static analysis shows zero entry points, this is a critical oversight. If any entry points were to be introduced in future versions or if the analysis somehow missed them, they would be entirely unprotected, leaving the site vulnerable to unauthorized actions. The plugin's vulnerability history is clean, but this is largely irrelevant given the current lack of protective measures. The overall conclusion is that while the current code is clean, the foundational security of the plugin is weak due to the absence of essential authorization and validation mechanisms, which is a significant risk for any WordPress plugin.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Missing authentication checks on entry points
Vulnerabilities
None known

Core Files Update Cleanup Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Core Files Update Cleanup Release Timeline

v1.1.0Current
v1.0.0
Code Analysis
Analyzed Mar 16, 2026

Core Files Update Cleanup Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0
Attack Surface

Core Files Update Cleanup Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionvnm_core_files_cleanup_activatedcore-files-update-cleanup.php:39
actionupgrader_process_completecore-files-update-cleanup.php:53
Maintenance & Trust

Core Files Update Cleanup Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedJan 23, 2024
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Core Files Update Cleanup Developer Profile

indextwo

4 plugins · 5K total installs

78
trust score
Avg Security Score
85/100
Avg Patch Time
37 days
View full developer profile
Detection Fingerprints

How We Detect Core Files Update Cleanup

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Core Files Update Cleanup