Optimize Database after Deleting Revisions Security & Risk Analysis

wordpress.org/plugins/rvg-optimize-database

One-click database optimization with precise revision cleanup and flexible scheduling. Speeding up sites since 2011!

60K active installs v5.3.0 PHP 5.6+ WP 2.8+ Updated Jul 21, 2025
databasedatabase-cleanupdatabase-sizedelete-revisionsoptimize-database
99
A · Safe
CVEs total3
Unpatched0
Last CVEOct 3, 2023
Download
Safety Verdict

Is Optimize Database after Deleting Revisions Safe to Use in 2026?

Generally Safe

Score 99/100

Optimize Database after Deleting Revisions has a strong security track record. Known vulnerabilities have been patched promptly.

3 known CVEsLast CVE: Oct 3, 2023Updated 8mo ago
Risk Assessment

The rvg-optimize-database plugin v5.3.0 demonstrates a generally good security posture with a robust adherence to prepared statements for SQL queries and a notable absence of external HTTP requests and dangerous functions. The static analysis reveals a zero attack surface in terms of AJAX handlers, REST API routes, and shortcodes without proper authentication or permission checks, which is a significant strength. Furthermore, the lack of any reported taint analysis findings suggests that any potential data flows are handled with appropriate sanitization.

However, there are areas for improvement. The output escaping is a notable concern, with only 23% of outputs being properly escaped. This could potentially lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is rendered without adequate sanitization. The vulnerability history, while currently showing no unpatched CVEs, indicates a past pattern of medium-severity issues, specifically related to Missing Authorization and Cross-Site Request Forgery (CSRF). This suggests that while recent versions may be more secure, historical weaknesses warrant continued vigilance and thorough code reviews.

In conclusion, rvg-optimize-database v5.3.0 exhibits strengths in preventing direct code execution and external interactions. The primary weaknesses lie in output escaping and historical vulnerability patterns. While the immediate risk appears moderate due to the absence of active critical or high vulnerabilities and a zero attack surface without checks, the past prevalence of authorization and CSRF issues, combined with insufficient output escaping, indicates a need for ongoing security audits to ensure these vulnerabilities are not reintroduced or remain exploitable.

Key Concerns

  • Low output escaping percentage
  • Past medium severity vulnerabilities (Missing Authorization, CSRF)
Vulnerabilities
3

Optimize Database after Deleting Revisions Security Vulnerabilities

CVEs by Year

3 CVEs in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
3

3 total CVEs

Optimize Database after Deleting Revisions <= 5.0.110 - Missing Authorization via 'odb_csv_download'

Oct 3, 2023 Patched in 5.1 (112d)
CVE-2023-25980medium · 4.3Cross-Site Request Forgery (CSRF)

Optimize Database after Deleting Revisions <= 5.1.1 - Cross-Site Request Forgery via 'odb_start_manually'

Jul 26, 2023 Patched in 5.2 (191d)
WF-5d01548e-91bf-44db-83dc-10c7d5962f9b-rvg-optimize-databasemedium · 4.3Cross-Site Request Forgery (CSRF)

Optimize Database after Deleting Revisions <= 5.0.110 - Cross-Site Request Forgery via 'odb_csv_download'

Jul 26, 2023 Patched in 5.1 (181d)
Code Analysis
Analyzed Mar 16, 2026

Optimize Database after Deleting Revisions Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
69 prepared
Unescaped Output
144
44 escaped
Nonce Checks
3
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

96% prepared72 total queries

Output Escaping

23% escaped188 total outputs
Attack Surface

Optimize Database after Deleting Revisions Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
filtercron_schedulesclasses\odb-scheduler.php:18
actionodb_schedulerclasses\odb-scheduler.php:21
actionplugins_loadedrvg-optimize-database.php:17
actioninitrvg-optimize-database.php:104
actionadmin_menurvg-optimize-database.php:405
actionadmin_menurvg-optimize-database.php:406
actionadmin_menurvg-optimize-database.php:411
actionadmin_menurvg-optimize-database.php:412
actionadmin_menurvg-optimize-database.php:419
actionadmin_menurvg-optimize-database.php:420
actionwp_before_admin_bar_renderrvg-optimize-database.php:425
actionadmin_menurvg-optimize-database.php:428

Scheduled Events 2

odb_scheduler
odb_scheduler
Maintenance & Trust

Optimize Database after Deleting Revisions Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJul 21, 2025
PHP min version5.6
Downloads4.0M

Community Trust

Rating94/100
Number of ratings181
Active installs60K
Developer Profile

Optimize Database after Deleting Revisions Developer Profile

NerdPress

4 plugins · 191K total installs

78
trust score
Avg Security Score
98/100
Avg Patch Time
328 days
View full developer profile
Detection Fingerprints

How We Detect Optimize Database after Deleting Revisions

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/rvg-optimize-database/css/style.css
Version Parameters
rvg-optimize-database/rvg-optimize-database.php?ver=rvg-optimize-database/css/style.css?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- CURRENT SITE DATE (yyyymmddHHiiss) AND UNIX TIMESTAMP, BASED ON TIMEZONE OF THE SITE<!-- v4.4.3<!-- v4.6<!-- INITIALIZE PLUGIN+7 more
Data Attributes
data-rvg-optimize-db-nonce
JS Globals
window.rvg_optimize_db_options
FAQ

Frequently Asked Questions about Optimize Database after Deleting Revisions