
Merge + Minify + Refresh Security & Risk Analysis
wordpress.org/plugins/merge-minify-refreshMerges/Concatenates CSS & Javascript and then minifies using Minify (for CSS) and Google Closure (for JS with Minify as a fallback).
Is Merge + Minify + Refresh Safe to Use in 2026?
Generally Safe
Score 96/100Merge + Minify + Refresh has a strong security track record. Known vulnerabilities have been patched promptly.
The merge-minify-refresh plugin, version 2.15, exhibits a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries and incorporating nonce and capability checks for its entry points. The attack surface is also relatively small, with all identified entry points seemingly protected by authorization checks. However, the static analysis reveals significant concerns regarding the use of dangerous functions like 'exec' and 'preg_replace(/e)', which can be exploited for remote code execution if not handled with extreme care and proper sanitization. Furthermore, a substantial portion of output is not properly escaped, presenting a risk of Cross-Site Scripting (XSS) vulnerabilities.
The plugin's vulnerability history, while showing no currently unpatched CVEs, indicates a past susceptibility to Cross-Site Request Forgery (CSRF) and at least one high-severity vulnerability. The last reported vulnerability was in 2026, which is in the future and should be treated as an anomaly or potential typo in the provided data; however, the pattern of past vulnerabilities suggests a need for ongoing vigilance. The presence of dangerous functions, coupled with a history of security issues, despite efforts to secure entry points, warrants caution. The unescaped output is a definite concern that needs immediate attention.
Key Concerns
- Dangerous functions used (exec, preg_replace(/e))
- Low percentage of properly escaped output
- Past high severity vulnerability history
- Past medium severity vulnerability history
Merge + Minify + Refresh Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
Merge + Minify + Refresh <= 2.14 - Cross-Site Request Forgery
Merge + Minify + Refresh <= 1.10.7 - Cross-Site Request Forgery leading to Arbitrary File Deletion and Site Reset
Merge + Minify + Refresh Code Analysis
Dangerous Functions Found
Output Escaping
Merge + Minify + Refresh Attack Surface
AJAX Handlers 1
WordPress Hooks 15
Scheduled Events 2
Maintenance & Trust
Merge + Minify + Refresh Maintenance & Trust
Maintenance Signals
Community Trust
Merge + Minify + Refresh Alternatives
Merge + Minify + Refresh Check DIVI
mmr-disable-for-divi
Disable MMR when editing a page using the DIVI editor.
Merge + Minify + Refresh Check Visual Composer
mmr-disable-for-visual-composer-editor
Disable MMR when editing a page using the Visual Composer editor.
Merge + Minify + Refresh Clear Caches
merge-minify-refresh-clear-caches
This plugin clears other page caches/proxies when the Merge + Minify + Refresh cache is regenerated.
MinQueue
minqueue
Minify & Concatenate Enqueued Scripts & Styles.
APH Merge Scripts
aph-merge-scripts
Merge and minify CSS & javascript files into one file. Easy to use. Support remote file - Javascript & CSS files hosted on other server or CDN
Merge + Minify + Refresh Developer Profile
4 plugins · 5K total installs
How We Detect Merge + Minify + Refresh
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/merge-minify-refresh/css/admin.css/wp-content/plugins/merge-minify-refresh/js/admin.js/wp-content/plugins/merge-minify-refresh/js/admin.js/wp-content/plugins/merge-minify-refresh/js/merge-minify-refresh.jsmerge-minify-refresh/css/admin.css?ver=merge-minify-refresh/js/admin.js?ver=merge-minify-refresh/js/merge-minify-refresh.js?ver=HTML / DOM Fingerprints
mmr-admin-noticedata-mmr-noncemmr_admin_script_vars