
Filename based asset cache busting Security & Risk Analysis
wordpress.org/plugins/filename-based-asset-cache-bustingFilename based cache busting for WordPress scripts/styles using last modified date.
Is Filename based asset cache busting Safe to Use in 2026?
Generally Safe
Score 85/100Filename based asset cache busting has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "filename-based-asset-cache-busting" v1.4 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the plugin avoids dangerous functions and utilizes prepared statements for all its SQL queries, indicating good secure coding practices in these areas. The vulnerability history also shows a clean slate with no recorded CVEs, suggesting a history of secure development or effective patching.
However, there are notable concerns that temper this otherwise positive assessment. The most significant issue is the lack of output escaping. With one total output identified and 0% properly escaped, this presents a clear risk of cross-site scripting (XSS) vulnerabilities. Any dynamic data outputted by the plugin without proper sanitization could be exploited by attackers. Additionally, the presence of a file operation without explicit context regarding its security implications is a minor point of concern. The lack of nonces and capability checks, while not directly exploitable due to the limited attack surface, represents a missed opportunity for robust security in broader contexts.
In conclusion, while the plugin has a solid foundation with a minimal attack surface and secure database practices, the unescaped output is a critical vulnerability that needs immediate attention. The absence of past vulnerabilities is a positive indicator, but it does not negate the immediate risk posed by the unescaped output. Addressing the output escaping issue should be the highest priority to improve the plugin's overall security.
Key Concerns
- Unescaped output
- File operation without context
- Missing capability checks
- Missing nonce checks
Filename based asset cache busting Security Vulnerabilities
Filename based asset cache busting Code Analysis
Output Escaping
Filename based asset cache busting Attack Surface
WordPress Hooks 7
Maintenance & Trust
Filename based asset cache busting Maintenance & Trust
Maintenance Signals
Community Trust
Filename based asset cache busting Alternatives
Assets to footer
assets-to-footer
Moves scripts and styles to the footer.
AssetsMinify
assetsminify
Use Compass, Sass, Less, Stylus, CoffeeScript (and more ...) to develop your themes and minify your stylesheets and JavaScript.
Minify
minify
Automagically concatenates JS and CSS files that are output in wp_head() and wp_footer()
CS Remove Version Number From CSS & JS
cs-remove-version-number-from-css-js
This plugin will remove the version number from CSS and JS files.
Manage/Remove version number from CSS & JS
manageremove-version-number-from-css-js
This plugin provide an option to manage or remove the version number from CSS and JS files.
Filename based asset cache busting Developer Profile
2 plugins · 270 total installs
How We Detect Filename based asset cache busting
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/filename-based-asset-cache-busting//wp-content/plugins/filename-based-asset-cache-busting/ver=.([0-9\.]+)\.(js|css)HTML / DOM Fingerprints
<!-- FBACB --><!-- still fbacb --><!-- END FBACB -->FBACB-Php-Fallback: yes