Proxy Cache Purge Security & Risk Analysis

wordpress.org/plugins/varnish-http-purge

Automatically empty proxy cached content when your site is modified.

40K active installs v5.7.0 PHP 5.6+ WP 5.0+ Updated Mar 13, 2026
cachenginxproxypurgevarnish
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Proxy Cache Purge Safe to Use in 2026?

Generally Safe

Score 100/100

Proxy Cache Purge has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 21d ago
Risk Assessment

The varnish-http-purge plugin v5.8.0 generally exhibits good security practices, particularly in its handling of SQL queries and output escaping. The absence of known CVEs and a clean vulnerability history are strong indicators of a well-maintained and secure codebase. The plugin also demonstrates a commendable approach to securing its entry points, with all identified AJAX handlers, REST API routes, and cron events appearing to have proper authentication and authorization checks.

However, a few areas warrant attention. The presence of a 'dangerous function' (system) raises a flag, as these functions can be misused if not carefully handled. While the taint analysis shows no critical or high-severity flows with unsanitized paths, the fact that both analyzed flows had 'unsanitized paths' suggests a potential for issues if the inputs to the 'system' function are not strictly validated. Furthermore, the plugin performs several file operations and external HTTP requests, which, while not inherently insecure, represent potential vectors for attack if not implemented with robust validation and sanitization. The plugin also uses 8 nonce checks and 14 capability checks, which is positive for security but could potentially be a slight performance consideration or indicate an area where some checks might be redundant if not carefully architected.

Overall, this plugin appears to be in a strong security posture due to its proactive security measures and lack of historical vulnerabilities. The primary concerns revolve around the potential misuse of the 'system' function and the handling of inputs related to file operations and external requests. Rigorous input validation and sanitization around these functions are crucial. The limited attack surface and well-protected entry points are significant strengths that contribute to its overall good security rating.

Key Concerns

  • Dangerous function used ('system')
  • Taint flows with unsanitized paths detected
Vulnerabilities
None known

Proxy Cache Purge Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Proxy Cache Purge Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
2
152 escaped
Nonce Checks
8
Capability Checks
14
File Operations
3
External Requests
11
Bundled Libraries
0

Dangerous Functions Found

systemsystem( $cmd );wp-cli.php:302

Output Escaping

99% escaped154 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
execute_purge (varnish-http-purge.php:1182)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Proxy Cache Purge Attack Surface

Entry Points4
Unprotected0

AJAX Handlers 4

authwp_ajax_vhp_cache_testsettings.php:27
authwp_ajax_vhp_health_scoresettings.php:28
authwp_ajax_vhp_dismiss_cacheability_noticevarnish-http-purge.php:200
authwp_ajax_vhp_dismiss_woo_cache_noticevarnish-http-purge.php:206
WordPress Hooks 27
filtersite_status_testshealth-check.php:12
actionadmin_initsettings.php:24
actionadmin_menusettings.php:25
filteradmin_footer_textsettings.php:26
filtervarnish_http_purge_valid_post_statusessettings.php:31
actioninitvarnish-http-purge.php:153
actionadmin_initvarnish-http-purge.php:154
actionimport_startvarnish-http-purge.php:155
actionimport_endvarnish-http-purge.php:156
actionupgrader_process_completevarnish-http-purge.php:159
actionactivity_box_endvarnish-http-purge.php:173
actionadmin_noticesvarnish-http-purge.php:179
actionadmin_noticesvarnish-http-purge.php:188
actionadmin_noticesvarnish-http-purge.php:193
actionadmin_noticesvarnish-http-purge.php:197
actionadmin_noticesvarnish-http-purge.php:203
filterstyle_loader_srcvarnish-http-purge.php:237
filterscript_loader_srcvarnish-http-purge.php:238
actionshutdownvarnish-http-purge.php:264
actionvhp_process_purge_queuevarnish-http-purge.php:267
actiontransition_post_statusvarnish-http-purge.php:272
actionadmin_noticesvarnish-http-purge.php:279
actionadmin_noticesvarnish-http-purge.php:281
actionadmin_bar_menuvarnish-http-purge.php:286
actionadmin_enqueue_scriptsvarnish-http-purge.php:287
actionwp_enqueue_scriptsvarnish-http-purge.php:288
actionsend_headersvarnish-tags.php:18

Scheduled Events 1

vhp_process_purge_queue
Maintenance & Trust

Proxy Cache Purge Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedMar 13, 2026
PHP min version5.6
Downloads2.2M

Community Trust

Rating88/100
Number of ratings26
Active installs40K
Developer Profile

Proxy Cache Purge Developer Profile

Danila Vershinin

3 plugins · 40K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Proxy Cache Purge

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/varnish-http-purge/css/admin.css/wp-content/plugins/varnish-http-purge/js/admin.js
Script Paths
/wp-content/plugins/varnish-http-purge/js/admin.js
Version Parameters
varnish-http-purge/css/admin.css?ver=varnish-http-purge/js/admin.js?ver=

HTML / DOM Fingerprints

JS Globals
VarnishPurgerVarnishDebug
FAQ

Frequently Asked Questions about Proxy Cache Purge