TNC Toolbox: Web Performance Security & Risk Analysis

wordpress.org/plugins/tnc-toolbox

Designed for ea-NGINX (Cache/Proxy) on cPanel+WHM. Made to help you fly online! 🚀

1K active installs v2.1.2 PHP + WP + Updated Jan 13, 2026
automatic-purgecache-purgefreewarenginxweb-performance
93
A · Safe
CVEs total2
Unpatched0
Last CVENov 29, 2025
Safety Verdict

Is TNC Toolbox: Web Performance Safe to Use in 2026?

Generally Safe

Score 93/100

TNC Toolbox: Web Performance has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Nov 29, 2025Updated 2mo ago
Risk Assessment

The tnc-toolbox plugin v2.1.2 presents a mixed security posture. On the positive side, the static analysis shows good practices in several areas. There are no detected dangerous functions, and all SQL queries utilize prepared statements, which is excellent for preventing SQL injection. Furthermore, the plugin implements a substantial number of nonce and capability checks, indicating an effort to secure its entry points. The limited attack surface with only one AJAX handler, which is also properly authenticated, is a strength. However, a significant concern arises from the vulnerability history, which includes two known CVEs, one of which was critical, and another medium severity. The fact that both are listed as 'currently unpatched' (despite the last vulnerability date being in the future, which might be an anomaly in the data) is a serious red flag.

The static analysis reveals a moderate level of concern regarding output escaping, with 29% of outputs not being properly escaped. While not directly flagged as a specific vulnerability type in the history, unescaped output can lead to Cross-Site Scripting (XSS) vulnerabilities. The plugin also performs file operations, and without knowing the specifics, this could introduce risks if not handled with extreme care, especially if user-supplied data is involved in file paths or operations.

Overall, while the plugin demonstrates some good security hygiene in its code, the historical presence of critical and medium vulnerabilities, particularly those related to Missing Authorization and Insecure Storage of Sensitive Information, cannot be ignored. The unpatched status of these historical vulnerabilities, if accurate, significantly elevates the risk. The issues with output escaping and file operations, while not immediately critical based on this data alone, warrant attention as potential attack vectors.

Key Concerns

  • Critical and Medium Severity Vulnerabilities in History
  • Unescaped Output detected
  • File Operations present
Vulnerabilities
2

TNC Toolbox: Web Performance Security Vulnerabilities

CVEs by Year

2 CVEs in 2025
2025
Patched Has unpatched

Severity Breakdown

Critical
1
Medium
1

2 total CVEs

CVE-2025-66108medium · 4.3Missing Authorization

TNC Toolbox: Web Performance <= 2.0.4 - Missing Authorization

Nov 29, 2025 Patched in 2.0.5 (13d)
CVE-2025-12539critical · 10Insecure Storage of Sensitive Information

TNC Toolbox: Web Performance <= 1.4.2 - Unauthenticated Sensitive Information Exposure to Privilege Escalation/cPanel Account Takeover

Nov 10, 2025 Patched in 2.0.0 (1d)
Code Analysis
Analyzed Mar 16, 2026

TNC Toolbox: Web Performance Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
15 escaped
Nonce Checks
6
Capability Checks
10
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

71% escaped21 total outputs
Attack Surface

TNC Toolbox: Web Performance Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_tnc_test_slack_webhookcore\settings.php:53
WordPress Hooks 23
actioninitcore\core.php:43
actioninitcore\core.php:46
actionadmin_enqueue_scriptscore\core.php:57
actionwp_enqueue_scriptscore\core.php:58
actionadmin_bar_menucore\core.php:59
actionadmin_bar_menucore\core.php:60
actionadmin_bar_menucore\core.php:61
actionadmin_bar_menucore\core.php:62
actionadmin_post_nginx_cache_purgecore\core.php:65
actionadmin_post_nginx_purge_this_pagecore\core.php:66
actionpost_updatedcore\core.php:67
actiontransition_post_statuscore\core.php:68
action_core_updated_successfullycore\core.php:69
actionadmin_noticescore\core.php:72
actionacf/options_page/savecore\core.php:76
actionadmin_bar_menucore\core.php:85
actionadmin_post_nginx_cache_offcore\core.php:86
actionadmin_bar_menucore\core.php:87
actionadmin_post_nginx_cache_oncore\core.php:88
actioninitcore\settings.php:51
actionadmin_enqueue_scriptscore\settings.php:52
actionadmin_menucore\settings.php:77
actionplugins_loadedtnc-toolbox.php:94
Maintenance & Trust

TNC Toolbox: Web Performance Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 13, 2026
PHP min version
Downloads28K

Community Trust

Rating100/100
Number of ratings4
Active installs1K
Developer Profile

TNC Toolbox: Web Performance Developer Profile

Merlot Digital (by TNC)

1 plugin · 1K total installs

95
trust score
Avg Security Score
93/100
Avg Patch Time
7 days
View full developer profile
Detection Fingerprints

How We Detect TNC Toolbox: Web Performance

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/tnc-toolbox/css/tnc-toolbox-admin.css/wp-content/plugins/tnc-toolbox/css/tnc-toolbox-frontend.css/wp-content/plugins/tnc-toolbox/js/tnc-toolbox-admin.js/wp-content/plugins/tnc-toolbox/js/tnc-toolbox-frontend.js
Version Parameters
tnc-toolbox/css/tnc-toolbox-admin.css?ver=tnc-toolbox/css/tnc-toolbox-frontend.css?ver=tnc-toolbox/js/tnc-toolbox-admin.js?ver=tnc-toolbox/js/tnc-toolbox-frontend.js?ver=

HTML / DOM Fingerprints

CSS Classes
tnc-toolbox-admin-bar-menutnc-cache-purge-status
Data Attributes
data-tnc-purge-type
JS Globals
tnc_toolbox_ajax_object
FAQ

Frequently Asked Questions about TNC Toolbox: Web Performance