CSS-JS-Booster Security & Risk Analysis

wordpress.org/plugins/css-js-booster

CSS-JS-Booster automates performance optimizing steps related to CSS, Media and Javascript linking/embedding.

20 active installs v0.6.2.179 PHP + WP 2.9.1+ Updated Oct 20, 2010
cssfrontendloading-timeperformancespeed
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CSS-JS-Booster Safe to Use in 2026?

Generally Safe

Score 85/100

CSS-JS-Booster has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "css-js-booster" plugin, in version 0.6.2.179, presents a mixed security profile. On the positive side, it demonstrates good practices by not having any known CVEs, a zero-attack surface through common entry points like AJAX, REST API, and shortcodes, and all SQL queries are prepared. This indicates a deliberate effort to avoid common and exploitable vulnerabilities.

However, the static analysis reveals significant concerns. The presence of the `unserialize` function is a major red flag, as it can lead to Remote Code Execution if used with untrusted input. Compounding this, the taint analysis shows a critical high severity flow with unsanitized paths, suggesting that data processed by the plugin could potentially be manipulated to exploit the `unserialize` function or other vulnerabilities. The high percentage of file operations (74) also raises concerns about potential insecure file handling, especially in conjunction with unsanitized paths.

While the plugin has no recorded vulnerability history, this does not guarantee future security. The identified code signals, particularly `unserialize` and the high-severity taint flow, represent substantial risks. The lack of nonce and capability checks on the identified entry points further exacerbates these risks, though in this specific analysis, the attack surface for these checks is zero. The conclusion is that while the plugin avoids historical and common web vulnerabilities, the presence of dangerous functions and unsanitized data flows creates a significant and immediate risk that requires urgent attention.

Key Concerns

  • Dangerous function 'unserialize' detected
  • High severity taint flow with unsanitized paths
  • Large number of file operations (potential risk)
  • 0% of outputs properly escaped (based on 39 outputs)
Vulnerabilities
None known

CSS-JS-Booster Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

CSS-JS-Booster Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

CSS-JS-Booster Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
9
30 escaped
Nonce Checks
0
Capability Checks
0
File Operations
74
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$line_infos = unserialize(file_get_contents($cachefiledata));booster_inc.php:1200

Output Escaping

77% escaped39 total outputs
Data Flows · Security
9 unsanitized

Data Flow Analysis

9 flows9 with unsanitized paths
<booster_css> (booster_css.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

CSS-JS-Booster Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_footerwp_booster.php:440
Maintenance & Trust

CSS-JS-Booster Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.0
Last updatedOct 20, 2010
PHP min version
Downloads12K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

CSS-JS-Booster Developer Profile

Schepp

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CSS-JS-Booster

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/css-js-booster/booster_cache/

HTML / DOM Fingerprints

HTML Comments
<!-- Moved to file by Booster<!-- Failed to move inline-style to file
FAQ

Frequently Asked Questions about CSS-JS-Booster