KT-CleanPress Security & Risk Analysis

wordpress.org/plugins/kt-cleanpress

Clean And Optimize WordPress .

20 active installs v1.1 PHP + WP 3.1+ Updated Jul 31, 2012
cleandatabaseoptimizeremovetrash
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is KT-CleanPress Safe to Use in 2026?

Generally Safe

Score 85/100

KT-CleanPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The static analysis of kt-cleanpress v1.1 reveals a plugin with a very limited attack surface. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, which significantly reduces the potential entry points for attackers. Furthermore, the code signals indicate a strong adherence to output escaping best practices, with 100% of outputs being properly escaped, and no dangerous functions, file operations, or external HTTP requests were detected. The taint analysis also shows no identified unsanitized paths, suggesting that data flowing through the plugin is handled safely in this regard.

However, a significant concern is the handling of SQL queries. All 22 identified SQL queries are executed without using prepared statements. This is a critical security weakness that makes the plugin highly vulnerable to SQL injection attacks. The absence of nonce and capability checks, while not directly linked to an attack surface in this version, leaves a potential for privilege escalation or unauthorized actions if new functionalities were to be added without proper authorization checks. The vulnerability history being clean is a positive sign, but it does not mitigate the inherent risks posed by the raw SQL queries.

In conclusion, while kt-cleanpress v1.1 exhibits good practices in output escaping and a minimal attack surface, the lack of prepared statements for all SQL queries is a glaring vulnerability that overshadows these strengths. This makes the plugin a high risk for SQL injection. The absence of nonce and capability checks further increases the potential risk profile, especially if the plugin were to be expanded in the future. Users should be cautious and ideally seek a version that addresses the SQL injection vulnerability.

Key Concerns

  • Raw SQL queries without prepared statements
  • 0 Nonce checks detected
  • 0 Capability checks detected
Vulnerabilities
None known

KT-CleanPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

KT-CleanPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
22
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared22 total queries
Attack Surface

KT-CleanPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menukt-cleanpress.php:31
Maintenance & Trust

KT-CleanPress Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedJul 31, 2012
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

KT-CleanPress Developer Profile

mohamad wael

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect KT-CleanPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/kt-cleanpress/includes/css/ktclean.css
Version Parameters
kt-cleanpress/style.css?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- if ( 'kt-initdisplay.php' == basename( $_SERVER['PHP_SELF'] ) ) exit(); -->
FAQ

Frequently Asked Questions about KT-CleanPress