Enesozer Guard for Core Web Vitals Security & Risk Analysis

wordpress.org/plugins/enesozer-guard-for-core-web-vitals

Monitor and remediate Core Web Vitals regressions.

0 active installs v0.1.2 PHP 8.0+ WP 6.4+ Updated Mar 20, 2026
core-web-vitalsmonitoringpagespeedperformance
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Enesozer Guard for Core Web Vitals Safe to Use in 2026?

Generally Safe

Score 100/100

Enesozer Guard for Core Web Vitals has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The enesozer-guard-for-core-web-vitals plugin, version 0.1.2, exhibits a mixed security posture. On the positive side, the plugin demonstrates good coding practices by using prepared statements for all SQL queries and ensuring proper output escaping. There are no identified dangerous functions, file operations, external HTTP requests, or bundled libraries that could introduce vulnerabilities. The absence of any recorded vulnerabilities or CVEs in its history is also a strong indicator of a secure development process thus far.

However, a significant concern arises from the plugin's attack surface. It exposes one REST API route that lacks any permission callbacks, rendering it accessible to any user, including unauthenticated ones. This is a critical oversight as it presents a direct entry point for potential exploitation without any authorization checks. The lack of nonce checks on AJAX handlers, while currently at zero, is also a potential area of concern if AJAX functionality is added in the future without proper security measures.

In conclusion, while the plugin excels in areas like data sanitization and query security, the unprotected REST API route is a glaring weakness that elevates the overall risk. The vulnerability history is reassuring, but the current static analysis reveals a specific, exploitable flaw. Addressing the unprotected REST API route should be the immediate priority to improve the plugin's security.

Key Concerns

  • Unprotected REST API route without permission callback
  • No nonce checks on AJAX handlers (potential future risk)
Vulnerabilities
None known

Enesozer Guard for Core Web Vitals Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Enesozer Guard for Core Web Vitals Release Timeline

v0.1.2Current
Code Analysis
Analyzed Apr 16, 2026

Enesozer Guard for Core Web Vitals Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface
1 unprotected

Enesozer Guard for Core Web Vitals Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

GET/wp-json/para/v1/healthenesozer-guard-for-core-web-vitals.php:19
WordPress Hooks 1
actionrest_api_initenesozer-guard-for-core-web-vitals.php:18
Maintenance & Trust

Enesozer Guard for Core Web Vitals Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 20, 2026
PHP min version8.0
Downloads141

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Enesozer Guard for Core Web Vitals Developer Profile

enesozer

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Enesozer Guard for Core Web Vitals

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
enesozer-guard-for-core-web-vitals/enesozer-guard-for-core-web-vitals.php?ver=

HTML / DOM Fingerprints

REST Endpoints
/wp-json/para/v1/health
FAQ

Frequently Asked Questions about Enesozer Guard for Core Web Vitals