
Less PHP Compiler Security & Risk Analysis
wordpress.org/plugins/lessphpIncludes the less.php preprocessor so that it may be used by other plugins or themes.
Is Less PHP Compiler Safe to Use in 2026?
Generally Safe
Score 85/100Less PHP Compiler has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The lessphp plugin version 2.0.1 presents a mixed security posture. On the positive side, there are no known historical vulnerabilities (CVEs) and the plugin demonstrates good practices regarding SQL queries, exclusively using prepared statements. The absence of external HTTP requests and a lack of reported common vulnerability types also contribute to a perceived stability.
However, the static analysis reveals several areas of concern. The presence of the `unserialize` function is a significant risk, especially when not paired with robust input validation or nonce checks. The taint analysis highlights two flows with unsanitized paths, which, while not classified as critical or high severity in this analysis, indicate potential pathways for malicious input to be processed without proper sanitization. Furthermore, the low percentage of properly escaped output (20%) suggests a risk of cross-site scripting (XSS) vulnerabilities. The lack of any capability checks or nonce checks on any potential entry points (even though the attack surface is reported as zero) means that if any new entry points were to be introduced or discovered, they might be inherently vulnerable.
In conclusion, while the plugin has a clean vulnerability history and employs some secure coding practices, the identified risks related to `unserialize`, unsanitized taint flows, and insufficient output escaping warrant attention. The absence of explicit security checks on potential entry points, despite the current zero-attack surface, is a weakness that could be exploited if the plugin's functionality were to expand or if an overlooked entry point existed. It is recommended to address the identified code signals and taint flow issues to improve the overall security of the plugin.
Key Concerns
- Dangerous function: unserialize present
- Taint flows with unsanitized paths
- Low output escaping percentage (20%)
- No nonce checks on any entry points
- No capability checks on any entry points
Less PHP Compiler Security Vulnerabilities
Less PHP Compiler Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Less PHP Compiler Attack Surface
Maintenance & Trust
Less PHP Compiler Maintenance & Trust
Maintenance Signals
Community Trust
Less PHP Compiler Alternatives
LESS Compiler
less-compiler
LESS compiler for WordPress. Allows you to write and compile LESS, and to edit style variables straight into your WordPress dashboard.
Temporary Login Without Password
temporary-login-without-password
Create self-expiring, temporary admin accounts. Easily share direct login links (no need for username/password) with your developers or editors.
Ajax Load More – Infinite Scroll, Load More, & Lazy Load
ajax-load-more
Add infinite scroll, lazy loading, and load more buttons to posts, pages, and WooCommerce products — fast and fully customizable for WordPress.
Temporary Login
temporary-login
Create a secure, temporary URL for easy access to your WP admin.
WPGraphQL
wp-graphql
WPGraphQL adds a flexible and powerful GraphQL API to WordPress, enabling efficient querying and interaction with your site's data.
Less PHP Compiler Developer Profile
6 plugins · 6K total installs
How We Detect Less PHP Compiler
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/lessphp/less-php/less.php