Enqueueror Security & Risk Analysis

wordpress.org/plugins/enqueueror

Supercharged CSS & JS Coding for WordPress

100 active installs v1.4.0 PHP 7.1+ WP 5.0+ Updated Jul 19, 2024
cssdevelopmentjavascripttheme
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Enqueueror Safe to Use in 2026?

Generally Safe

Score 92/100

Enqueueror has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The 'enqueueror' plugin v1.4.0 exhibits a strong security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events suggests a very limited attack surface, which is a significant strength. Furthermore, the code signals indicate good development practices: no dangerous functions were detected, all SQL queries utilize prepared statements, and all output is properly escaped. The plugin also avoids external HTTP requests, which can be a common vector for vulnerabilities.

However, there are a few areas that warrant attention. The plugin performs 7 file operations, and without explicit details on how these are handled, there's a potential for insecure file manipulation if user input is involved and not properly sanitized. The lack of nonce checks and capability checks across any entry points, combined with the absence of any recorded vulnerabilities, suggests that either the plugin's functionality doesn't expose sensitive operations, or it relies entirely on external WordPress core mechanisms for authorization and integrity, which is not ideal if any of its limited entry points were to expand in the future.

Overall, 'enqueueror' v1.4.0 appears to be a secure plugin for its current version and scope. The development team has demonstrated good security practices in its core functionality. The primary concern stems from the file operations and the complete absence of explicit authorization checks, which could become a risk if the plugin's feature set were to grow or if its limited attack surface were to be misconfigured. Given the clean vulnerability history and the absence of critical taint flows, the current risk is low, but the potential for issues with file operations or future expansion without explicit security controls should be monitored.

Key Concerns

  • File operations without clear sanitization context
  • 0 Nonce checks present
  • 0 Capability checks present
Vulnerabilities
None known

Enqueueror Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Enqueueror Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
7
External Requests
0
Bundled Libraries
0
Attack Surface

Enqueueror Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitsrc\Core.php:98
actionwp_enqueue_scriptssrc\Core.php:101
actionwp_footersrc\Core.php:104
actionswitch_themesrc\Core.php:107
Maintenance & Trust

Enqueueror Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedJul 19, 2024
PHP min version7.1
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

Enqueueror Developer Profile

Panagiotis (Panos) Anastasiadis

2 plugins · 140 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Enqueueror

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/enqueueror/src/assets/css/main.css/wp-content/plugins/enqueueror/src/assets/js/main.js
Script Paths
/wp-content/plugins/enqueueror/src/assets/js/main.js
Version Parameters
enqueueror/src/assets/css/main.css?ver=enqueueror/src/assets/js/main.js?ver=

HTML / DOM Fingerprints

JS Globals
window.enqueueror
FAQ

Frequently Asked Questions about Enqueueror