
Core Web Vitals & PageSpeed Booster Security & Risk Analysis
wordpress.org/plugins/core-web-vitals-pagespeed-boosterCore Web Vitals (CWV) is the new ranking factor
Is Core Web Vitals & PageSpeed Booster Safe to Use in 2026?
Mostly Safe
Score 76/100Core Web Vitals & PageSpeed Booster is generally safe to use. 2 past CVEs were resolved. Keep it updated.
The 'core-web-vitals-pagespeed-booster' plugin v1.0.28 exhibits a mixed security posture. While it demonstrates good practices in SQL query preparation and output escaping, several concerns are present. The plugin has a notable attack surface with 15 AJAX handlers, one of which is not protected by any authentication checks, posing a significant risk for unauthorized actions. The presence of the `create_function` dangerous function is also a concern, as it can lead to code injection vulnerabilities if not handled with extreme care. Taint analysis, while not revealing critical or high severity flaws, did identify flows with unsanitized paths, which could potentially be exploited in conjunction with other vulnerabilities.
The plugin's vulnerability history shows a pattern of medium severity issues, specifically Missing Authorization and Open Redirects. The fact that one of the two known CVEs remains unpatched, with the last reported vulnerability dated in the future (2025-12-31), is alarming. This indicates a lack of timely patching and potentially an ongoing security oversight. The combination of an unprotected entry point, historical vulnerabilities related to authorization and redirection, and the presence of dangerous functions suggests that this plugin requires careful review and potential remediation before widespread use.
In conclusion, while the plugin incorporates some robust security measures like prepared statements and proper output escaping, the unprotected AJAX handler, historical vulnerability trends, and the presence of dangerous code constructs significantly detract from its overall security. The unpatched CVE is a critical red flag. Users should be cautious and ensure the plugin is updated to address all known vulnerabilities. Further in-depth analysis of the unsanitized path flows is also recommended.
Key Concerns
- Unprotected AJAX handler
- Dangerous function 'create_function' used
- Flows with unsanitized paths
- 1 unpatched CVE (medium severity)
- Historical medium severity CVEs (Missing Auth, Open Redirect)
- Bundled library 'DataTables'
Core Web Vitals & PageSpeed Booster Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
Core Web Vitals & PageSpeed Booster <= 1.0.27 - Missing Authorization
Core Web Vitals & PageSpeed Booster <= 1.0.12 - Open Redirect via _wp_http_referer
Core Web Vitals & PageSpeed Booster Code Analysis
Dangerous Functions Found
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
Core Web Vitals & PageSpeed Booster Attack Surface
AJAX Handlers 15
WordPress Hooks 71
Scheduled Events 3
Maintenance & Trust
Core Web Vitals & PageSpeed Booster Maintenance & Trust
Maintenance Signals
Community Trust
Core Web Vitals & PageSpeed Booster Alternatives
WP Fastest Cache – WordPress Cache Plugin
wp-fastest-cache
The simplest and fastest WP Cache system
Speed Booster Pack ⚡ PageSpeed Optimization Suite
speed-booster-pack
PageSpeed optimization is vital for SEO: A faster website equals better conversions. Optimize your Core Web Vitals metrics (CLS, LCP, TBT) today!
AEH Speed Optimization: Browser Cache, Optimized Minify, Lazy Loading & Image Optimization
add-expires-headers
AEH Speed Optimization boosts site speed with caching, minification, lazy loading, and image optimization to improve performance and SEO.
F12 Profiler
f12-profiler
Comprehensive WordPress performance analysis with crawling, load time measurement, server diagnostics, and integrated optimization tools. Free.
Site Speed Test – SpeedGuard
speedguard
Tracks Core Web Vitals for you. Every single day, for free.
Core Web Vitals & PageSpeed Booster Developer Profile
3 plugins · 91K total installs
How We Detect Core Web Vitals & PageSpeed Booster
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/core-web-vitals-pagespeed-booster/assets/css/cwvpsb-admin.css/wp-content/plugins/core-web-vitals-pagespeed-booster/assets/js/cwvpsb-admin.js/wp-content/plugins/core-web-vitals-pagespeed-booster/assets/js/cwvpsb-frontend.js/wp-content/plugins/core-web-vitals-pagespeed-booster/assets/js/cwvpsb-frontend.jscore-web-vitals-pagespeed-booster/assets/css/cwvpsb-admin.css?ver=core-web-vitals-pagespeed-booster/assets/js/cwvpsb-admin.js?ver=core-web-vitals-pagespeed-booster/assets/js/cwvpsb-frontend.js?ver=HTML / DOM Fingerprints
cwvpsb-admin-pageCWVPSB Rulesdata-cwvpsb-noncedata-cwvpsb-urlcwvpsb_ajax_object