Core Web Vitals Booster Security & Risk Analysis

wordpress.org/plugins/speedien

Core web vitals booster for Nestify.io. This plugin will optimize pagespeed of your sites hosted on Nestify.

100 active installs v1.1.8 PHP 7.4+ WP 4.9+ Updated May 9, 2024
cachecore-web-vitalspagespeedvitalswebperf
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Core Web Vitals Booster Safe to Use in 2026?

Generally Safe

Score 92/100

Core Web Vitals Booster has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

Based on the static analysis, the 'speedien' v1.1.8 plugin exhibits a strong security posture. The absence of any identified entry points like AJAX handlers, REST API routes, shortcodes, or cron events significantly reduces its attack surface. Furthermore, the code demonstrates good development practices with 100% of SQL queries using prepared statements and a high rate of output escaping (88%). The plugin also implements at least one capability check, which is a fundamental security control.

However, a notable concern is the complete lack of nonce checks. While the attack surface is currently minimal, any future introduction of functionality that involves user interaction or data manipulation without nonce protection would represent a critical vulnerability to CSRF attacks. The limited number of file operations and external HTTP requests is positive, but their context and potential for misuse would need further investigation in a deeper analysis. The plugin's vulnerability history is clear, with no recorded CVEs, which suggests a history of secure development or a lack of prior significant security issues being publicly disclosed.

In conclusion, 'speedien' v1.1.8 appears to be a securely developed plugin at present, with a minimal attack surface and good adherence to common security best practices. The primary weakness identified is the complete absence of nonce checks, which poses a latent risk if the plugin's functionality expands. The lack of historical vulnerabilities is a positive indicator, but the absence of nonce checks should be addressed to ensure future resilience.

Key Concerns

  • Missing nonce checks
Vulnerabilities
None known

Core Web Vitals Booster Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Core Web Vitals Booster Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
28 escaped
Nonce Checks
0
Capability Checks
1
File Operations
4
External Requests
2
Bundled Libraries
0

Output Escaping

88% escaped32 total outputs
Attack Surface

Core Web Vitals Booster Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actiontemplate_redirectspeedien_cache.php:203
filterwpspdn_excludespeedien_cache.php:248
actionadmin_initspeedien_ui.php:90
actionadmin_menuspeedien_ui.php:231
actionadmin_post_speedien_preload_contentspeedien_ui.php:315
Maintenance & Trust

Core Web Vitals Booster Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMay 9, 2024
PHP min version7.4
Downloads487K

Community Trust

Rating66/100
Number of ratings7
Active installs100
Developer Profile

Core Web Vitals Booster Developer Profile

speedien

1 plugin · 100 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Core Web Vitals Booster

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Core Web Vitals Booster