
Native WP Cleaner Security & Risk Analysis
wordpress.org/plugins/native-wp-cleanerDisable native widgets, clean head tag from RSS, RSD, WLW Manifest links, disable XML-RPC, cleanup admin panel from columns, metaboxes, menu items.
Is Native WP Cleaner Safe to Use in 2026?
Generally Safe
Score 85/100Native WP Cleaner has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "native-wp-cleaner" v1.0 plugin exhibits a mixed security posture. On the positive side, the static analysis reveals no dangerous functions, no raw SQL queries, and no file operations or external HTTP requests, which are common sources of vulnerabilities. The absence of recorded vulnerabilities in its history also suggests a relatively stable past.
However, a significant concern is the complete lack of output escaping. With 207 outputs identified and 0% properly escaped, this presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Additionally, the absence of nonce checks and capability checks across all entry points (even though the attack surface is reported as zero) is concerning, as it implies a lack of proper authorization and protection against CSRF attacks if any entry points were to be discovered or introduced in future versions. The taint analysis returning no flows is positive but could also be influenced by the limited scope or nature of the code analyzed.
In conclusion, while the plugin avoids some common pitfalls, the pervasive lack of output escaping creates a high risk for XSS. The absence of authorization checks, though seemingly mitigated by a zero attack surface, warrants caution. The plugin's strength lies in its apparent avoidance of direct SQL injection or file manipulation risks, but the XSS risk is a critical weakness.
Key Concerns
- Output escaping is completely missing
- No nonce checks on entry points
- No capability checks on entry points
Native WP Cleaner Security Vulnerabilities
Native WP Cleaner Code Analysis
Output Escaping
Native WP Cleaner Attack Surface
WordPress Hooks 59
Maintenance & Trust
Native WP Cleaner Maintenance & Trust
Maintenance Signals
Community Trust
Native WP Cleaner Alternatives
Disable XML-RPC
disable-xml-rpc
Disables the XML-RPC API in WordPress 3.5+, which is enabled by default.
Disable XML-RPC-API
disable-xml-rpc-api
A simple and lightweight plugin to disable XML-RPC API, X-Pingback and pingback-ping in WordPress 3.5+ for a faster and more secure website
Remove & Disable XML-RPC Pingback
remove-xmlrpc-pingback-ping
Prevent pingback, XML-RPC and denial of service DDOS attacks by disabling the XML-RPC pingback functionality.
Manage XML-RPC
manage-xml-rpc
Enable/Disable XML-RPC for all or based on IP list, also you can control pingback and Unset X-Pingback from HTTP headers.
Stop XML-RPC Attacks
stop-xml-rpc-attacks
Blocks dangerous XML-RPC methods while preserving Jetpack, WooCommerce, and mobile apps compatibility.
Native WP Cleaner Developer Profile
2 plugins · 130 total installs
How We Detect Native WP Cleaner
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
native-wp-cleaner/style.css?ver=native-wp-cleaner/script.js?ver=HTML / DOM Fingerprints
nwpcpcode_tab<p style="visibility:hidden;height:1px;"><label for="username-login">Name<br><input type="text" name="username-login" value=""/></label></p>