SQLite Cache Security & Risk Analysis

wordpress.org/plugins/sqlite-cache

Provides SQLite cache storage that applied before WordPress core load. Doesn't create multiple html files but stores all pages in one file.

10 active installs v0.6.2 PHP + WP 3.8.1+ Updated Jul 1, 2016
cacheperformancesqlite
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SQLite Cache Safe to Use in 2026?

Generally Safe

Score 85/100

SQLite Cache has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "sqlite-cache" plugin, version 0.6.2, presents a mixed security profile. On the positive side, the plugin exhibits a small attack surface with no registered AJAX handlers, REST API routes, shortcodes, or cron events. This significantly limits the potential entry points for attackers. Furthermore, the plugin demonstrates a generally good practice in handling SQL queries, with a high percentage utilizing prepared statements, and a single capability check in place, which suggests some attention to access control.

However, several concerning signals are present. The use of the `unserialize` function is a critical red flag, as it can lead to Remote Code Execution (RCE) vulnerabilities if untrusted data is unserialized. While the taint analysis did not identify critical or high-severity flows, there are flows with unsanitized paths, indicating a potential for data to be mishandled. The low percentage of properly escaped output is another significant concern, as it can lead to Cross-Site Scripting (XSS) vulnerabilities when user-supplied or dynamic data is displayed without proper sanitization.

The plugin's vulnerability history is clean, with no recorded CVEs. This is a strong positive indicator and suggests that historically, the plugin has been relatively secure. However, the absence of past vulnerabilities does not guarantee future security, especially in light of the identified code signals like `unserialize` and poor output escaping. In conclusion, while "sqlite-cache" has strengths in its limited attack surface and SQL query handling, the presence of `unserialize` and insufficient output escaping represent significant risks that require careful consideration and mitigation.

Key Concerns

  • Dangerous function unserialize used
  • Low percentage of properly escaped output
  • Flows with unsanitized paths found
  • No nonce checks on potential entry points
Vulnerabilities
None known

SQLite Cache Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

SQLite Cache Code Analysis

Dangerous Functions
1
Raw SQL Queries
1
7 prepared
Unescaped Output
8
1 escaped
Nonce Checks
0
Capability Checks
1
File Operations
8
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$headers = $one['headers'] ? unserialize($one['headers']) : array();lite-cache.php:166

SQL Query Safety

88% prepared8 total queries

Output Escaping

11% escaped9 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

5 flows3 with unsanitized paths
__construct (lite-cache.php:13)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

SQLite Cache Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menuwp-sqlite-cache.php:37
actionadmin_initwp-sqlite-cache.php:41
actionpost_updatedwp-sqlite-cache.php:312
actiondelete_postwp-sqlite-cache.php:313
actionwp_trash_postwp-sqlite-cache.php:314
actiontransition_comment_statuswp-sqlite-cache.php:315
actionwp_insert_commentwp-sqlite-cache.php:316
Maintenance & Trust

SQLite Cache Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJul 1, 2016
PHP min version
Downloads2K

Community Trust

Rating80/100
Number of ratings2
Active installs10
Developer Profile

SQLite Cache Developer Profile

andreykashops

7 plugins · 2K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SQLite Cache

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sqlite-cache/css/litecache.css/wp-content/plugins/sqlite-cache/js/litecache.js
Script Paths
/wp-content/plugins/sqlite-cache/js/litecache.js
Version Parameters
sqlite-cache/css/litecache.css?ver=sqlite-cache/js/litecache.js?ver=

HTML / DOM Fingerprints

CSS Classes
lite-formlite-form2
Data Attributes
data-litecache-excludedata-litecache-expiredata-litecache-timerdata-litecache-content-typedata-litecache-content-lengthdata-litecache-etag+1 more
JS Globals
window.litecache
FAQ

Frequently Asked Questions about SQLite Cache