Peakhour Security & Risk Analysis

wordpress.org/plugins/peakhour

Seamlessly integrate wordpress with Peakhour's performance and security service. Peakhour can dramatically improve your page load times, block th …

10 active installs v1.0.3 PHP + WP 4.6.2+ Updated Sep 19, 2023
cachingcdnpeakhourperformancesecurity
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Peakhour Safe to Use in 2026?

Generally Safe

Score 85/100

Peakhour has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "peakhour" plugin v1.0.3 exhibits a concerning security posture primarily due to its exposed AJAX endpoints. While the plugin demonstrates good practices in its SQL query handling and avoids dangerous functions, the presence of three AJAX handlers without any authentication or capability checks presents a significant attack vector. This means any unauthenticated user could potentially interact with these endpoints, leading to unintended consequences or enabling further attacks if these handlers perform sensitive operations.

The taint analysis reveals one flow with an unsanitized path, which, although not classified as critical or high severity in this specific analysis, warrants attention. Unsanitized paths can be a precursor to path traversal vulnerabilities or other file-related exploits if the plugin interacts with the filesystem. The lack of nonce checks on these AJAX handlers further exacerbates the risk, as it opens the door to Cross-Site Request Forgery (CSRF) attacks.

Encouragingly, the plugin has no recorded vulnerabilities in its history, suggesting a potentially low-risk profile in the past. However, the current static analysis findings highlight potential weaknesses that could be exploited. The balanced conclusion is that while the plugin avoids some common pitfalls like raw SQL and dangerous functions, the unprotected AJAX endpoints and the single unsanitized path flow are significant security concerns that need immediate remediation. The lack of a vulnerability history does not negate the risks identified in the current code.

Key Concerns

  • Unprotected AJAX handlers
  • Flow with unsanitized paths
  • Missing nonce checks on AJAX
  • Insufficient capability checks on AJAX
  • Improper output escaping
Vulnerabilities
None known

Peakhour Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Peakhour Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
17 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

68% escaped25 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
purge_url (includes\class-peakhour-settings-page.php:495)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
3 unprotected

Peakhour Attack Surface

Entry Points3
Unprotected3

AJAX Handlers 3

authwp_ajax_purge_urlincludes\class-peakhour-settings-page.php:21
authwp_ajax_purge_all_nowincludes\class-peakhour-settings-page.php:22
authwp_ajax_test_peakhour_api_connectionincludes\class-peakhour-settings-page.php:23
WordPress Hooks 17
actionwpincludes\class-peakhour-cdn.php:34
actionwpincludes\class-peakhour-cdn.php:37
actionswitch_themeincludes\class-peakhour-cdn.php:41
actioncustomize_saveincludes\class-peakhour-cdn.php:42
actionautoptimize_action_cachepurgedincludes\class-peakhour-cdn.php:43
actiontrashed_postincludes\class-peakhour-cdn.php:44
actiondeleted_postincludes\class-peakhour-cdn.php:45
actionfuture_to_publishincludes\class-peakhour-cdn.php:46
actionsave_postincludes\class-peakhour-cdn.php:47
actionedit_postincludes\class-peakhour-cdn.php:48
actiondelete_attachmentincludes\class-peakhour-cdn.php:49
actionedited_termsincludes\class-peakhour-cdn.php:50
actiondelete_termincludes\class-peakhour-cdn.php:51
filterscript_loader_srcincludes\class-peakhour-remove-query-strings.php:18
filterstyle_loader_srcincludes\class-peakhour-remove-query-strings.php:19
actionadmin_menuincludes\class-peakhour-settings-page.php:19
actionadmin_initincludes\class-peakhour-settings-page.php:20
Maintenance & Trust

Peakhour Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedSep 19, 2023
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Peakhour Developer Profile

Daniel

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Peakhour

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/peakhour/includes/class-peakhour-cache-tag-collection.php/wp-content/plugins/peakhour/includes/class-peakhour-cache-tags-header.php/wp-content/plugins/peakhour/includes/class-peakhour-cdn.php/wp-content/plugins/peakhour/includes/class-peakhour-header.php/wp-content/plugins/peakhour/includes/class-peakhour-related-cache-tags.php/wp-content/plugins/peakhour/includes/class-peakhour-remove-query-strings.php/wp-content/plugins/peakhour/includes/class-peakhour-settings-page.php/wp-content/plugins/peakhour/includes/class-peakhour-settings.php+1 more

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Peakhour