Optimize More! Security & Risk Analysis

wordpress.org/plugins/optimize-more

A DIY WordPress Page Speed Optimization Pack. Optimize CSS & JavaScripts Delivery: Load CSS Asynchronously, Delay CSS & JavaScripts until User …

200 active installs v2.0.3 PHP 7.4+ WP 5.8+ Updated Feb 20, 2024
core-web-vitalscssjavascriptjsoptimize
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Optimize More! Safe to Use in 2026?

Generally Safe

Score 85/100

Optimize More! has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "optimize-more" v2.0.3 plugin exhibits a generally good security posture based on the static analysis. The absence of any entry points like AJAX handlers, REST API routes, shortcodes, or cron events is a significant strength, as it greatly limits the plugin's attack surface. Furthermore, the use of prepared statements for all SQL queries and the presence of nonce and capability checks on all identified flows are positive indicators of secure coding practices. The plugin also has no recorded vulnerability history, suggesting it has been well-maintained or has not been a target for exploit development.

However, a notable concern arises from the output escaping. With 175 total outputs and only 51% being properly escaped, there is a significant risk of Cross-Site Scripting (XSS) vulnerabilities. This means that a substantial portion of the plugin's output could potentially be manipulated by attackers to inject malicious scripts into user sessions. While the taint analysis did not reveal any unsanitized paths, the lack of consistent output escaping for a large percentage of outputs presents a tangible risk that warrants attention.

In conclusion, the "optimize-more" plugin is strong in its limited attack surface and secure data handling for SQL queries. The lack of historical vulnerabilities is also a positive sign. The primary weakness lies in the inconsistent output escaping, which introduces a considerable risk of XSS. Addressing this issue should be the priority to further strengthen the plugin's security.

Key Concerns

  • Significant portion of outputs not properly escaped
Vulnerabilities
None known

Optimize More! Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Optimize More! Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
85
90 escaped
Nonce Checks
2
Capability Checks
5
File Operations
2
External Requests
3
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

51% escaped175 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
import (includes\classes\Settings.php:117)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Optimize More! Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 23
actionadmin_menuincludes\classes\Core.php:11
filterplugin_row_metaincludes\classes\Core.php:14
actionadmin_enqueue_scriptsincludes\classes\Core.php:94
actionadmin_noticesincludes\classes\Messages.php:60
actionwp_enqueue_scriptsincludes\classes\NonParser.php:15
actionwp_enqueue_scriptsincludes\classes\NonParser.php:18
actioninitincludes\classes\NonParser.php:22
actionwp_default_scriptsincludes\classes\NonParser.php:26
actionwp_print_footer_scriptsincludes\classes\NonParser.php:38
actionwp_headincludes\classes\NonParser.php:42
actionwp_enqueue_scriptsincludes\classes\NonParser.php:46
filtertiny_mce_pluginsincludes\classes\NonParser.php:298
filterwp_resource_hintsincludes\classes\NonParser.php:306
filterembed_oembed_discoverincludes\classes\NonParser.php:324
filterrewrite_rules_arrayincludes\classes\NonParser.php:325
filterrest_endpointsincludes\classes\NonParser.php:326
filteroembed_response_dataincludes\classes\NonParser.php:327
actionwp_headincludes\classes\parts\AdvDeferJs.php:44
actionwp_print_footer_scriptsincludes\classes\parts\DelayCss.php:43
actionwp_print_footer_scriptsincludes\classes\parts\DelayJs.php:43
actioninitincludes\classes\Settings.php:13
actionopm_after_bodyincludes\classes\Settings.php:14
actionadmin_initoptimize-more.php:67
Maintenance & Trust

Optimize More! Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedFeb 20, 2024
PHP min version7.4
Downloads12K

Community Trust

Rating100/100
Number of ratings9
Active installs200
Developer Profile

Optimize More! Developer Profile

Arya Dhiratara

6 plugins · 4K total installs

82
trust score
Avg Security Score
83/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Optimize More!

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/optimize-more/assets/js/admin-settings.js/wp-content/plugins/optimize-more/assets/js/ays-beforeunload-shim.js/wp-content/plugins/optimize-more/assets/js/jquery-areyousure.js/wp-content/plugins/optimize-more/assets/css/admin-settings.css
Script Paths
js/admin-settings.jsjs/ays-beforeunload-shim.jsjs/jquery-areyousure.js
Version Parameters
optimize-more/assets/js/admin-settings.js?ver=optimize-more/assets/js/ays-beforeunload-shim.js?ver=optimize-more/assets/js/jquery-areyousure.js?ver=optimize-more/assets/css/admin-settings.css?ver=

HTML / DOM Fingerprints

Data Attributes
data-page-title="Optimize More!"
JS Globals
opm_instance
FAQ

Frequently Asked Questions about Optimize More!