Merge + Minify + Refresh Check DIVI Security & Risk Analysis

wordpress.org/plugins/mmr-disable-for-divi

Disable MMR when editing a page using the DIVI editor.

10 active installs v1.1.1 PHP + WP 3.6.1+ Updated Unknown
closureconcatenatemergeminifyrefresh
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Merge + Minify + Refresh Check DIVI Safe to Use in 2026?

Generally Safe

Score 100/100

Merge + Minify + Refresh Check DIVI has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "mmr-disable-for-divi" plugin v1.1.1 demonstrates a strong security posture based on the provided static analysis. The absence of any identified entry points like AJAX handlers, REST API routes, or shortcodes significantly limits the potential attack surface. Furthermore, the code exhibits excellent security practices, with no dangerous functions detected, all SQL queries using prepared statements, and all output being properly escaped. The lack of file operations and external HTTP requests further contributes to its security. The plugin also has no recorded vulnerability history, indicating a clean track record.

While the static analysis reveals no critical or high-severity issues, the complete absence of nonce and capability checks across all identified (though zero) entry points is a notable concern. This suggests that even if future entry points were to be introduced, they might be implemented without these fundamental security measures. The vulnerability history being entirely clean is a positive sign, but it's crucial to remember that past security is not a guarantee of future security, especially given the noted potential for missing checks. Overall, the plugin is currently very secure due to its minimal attack surface and clean code, but the lack of explicit authentication and authorization checks in its design represents a theoretical weakness that could become a problem if the plugin's functionality expands without addressing this gap.

Key Concerns

  • Missing nonce checks on potential entry points
  • Missing capability checks on potential entry points
Vulnerabilities
None known

Merge + Minify + Refresh Check DIVI Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Merge + Minify + Refresh Check DIVI Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Merge + Minify + Refresh Check DIVI Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filtershould_mmrmerge-minify-refresh-check-divi.php:43
Maintenance & Trust

Merge + Minify + Refresh Check DIVI Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedUnknown
PHP min version
Downloads1K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

Merge + Minify + Refresh Check DIVI Developer Profile

launchinteractive

4 plugins · 5K total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
737 days
View full developer profile
Detection Fingerprints

How We Detect Merge + Minify + Refresh Check DIVI

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Merge + Minify + Refresh Check DIVI