
LWSCache Security & Risk Analysis
wordpress.org/plugins/lwscacheThis plugin lets you manage and automatically purge your hosting's LWSCache whenever you edit your website's content
Is LWSCache Safe to Use in 2026?
Generally Safe
Score 99/100LWSCache has a strong security track record. Known vulnerabilities have been patched promptly.
The "lwscache" v2.9 plugin demonstrates some positive security practices, including a high percentage of SQL queries using prepared statements and a good rate of output escaping. The absence of critical or high-severity taint flows and dangerous functions is also a positive sign. However, the plugin exhibits significant security concerns related to its attack surface, specifically the presence of two AJAX handlers that lack authentication checks. This creates a direct pathway for unauthenticated users to potentially interact with sensitive plugin functionalities, posing a notable risk.
The vulnerability history shows one past medium-severity CVE related to improper authorization, which aligns with the identified unprotected AJAX endpoints. While there are no currently unpatched vulnerabilities, the recurring theme of authorization issues suggests a persistent area of weakness that requires ongoing attention. The static analysis also indicates a substantial number of file operations and external HTTP requests, which, while not inherently insecure, can increase the complexity and potential for vulnerabilities if not handled with extreme care, especially in the context of the unprotected entry points.
In conclusion, while "lwscache" v2.9 has strengths in its handling of SQL and output, the presence of unprotected AJAX endpoints is a critical flaw that elevates its risk profile. The past authorization vulnerability further underscores this concern. Addressing the unprotected AJAX handlers should be the immediate priority to improve the plugin's security posture.
Key Concerns
- Unprotected AJAX handlers found
- Past medium severity CVE (Improper Authorization)
LWSCache Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
LWSCache <= 2.8.5 - Missing Authorization to Authenticated (Subscriber+) Limited Plugin Activation via lwscache_activatePlugin Function
LWSCache Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
LWSCache Attack Surface
AJAX Handlers 10
WordPress Hooks 40
Scheduled Events 1
Maintenance & Trust
LWSCache Maintenance & Trust
Maintenance Signals
Community Trust
LWSCache Alternatives
Nginx Helper
nginx-helper
Cleans nginx's fastcgi/proxy cache or redis-cache whenever a post is edited/published. Also does a few more things.
Proxy Cache Purge
varnish-http-purge
Automatically empty proxy cached content when your site is modified.
Nginx Cache
nginx-cache
Purge the Nginx cache (FastCGI, Proxy, uWSGI) automatically when content changes or manually within WordPress.
Hestia Nginx Cache
hestia-nginx-cache
Purged the Nginx cache automatically after making website changes. Uses the new HestiaCP API, released in 1.6.0.
Nginx Cache Controller
nginx-champuru
Provides some functions of controlling Nginx proxy server cache.
LWSCache Developer Profile
6 plugins · 79K total installs
How We Detect LWSCache
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/lwscache/admin/icons/loading_black.svgHTML / DOM Fingerprints
lwscache_deactivate_buttonid="lwscache_deactivate_button"id="deactivate_wprocket_companion"ajaxurl