Varnish WordPress Security & Risk Analysis

wordpress.org/plugins/varnish-wp

This plugin enables you to use the Varnish cache with WordPress, designed for high performance websites.

70 active installs v1.7 PHP + WP 3.4+ Updated Feb 20, 2018
high-performance-wordpressvarnish-cachevarnish-wordpresswordpress-cachewordpress-varnish
64
C · Use Caution
CVEs total1
Unpatched1
Last CVEMar 31, 2025
Download
Safety Verdict

Is Varnish WordPress Safe to Use in 2026?

Use With Caution

Score 64/100

Varnish WordPress has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Mar 31, 2025Updated 8yr ago
Risk Assessment

The "varnish-wp" plugin v1.7 presents a mixed security posture. On the positive side, the plugin boasts zero identified entry points like AJAX handlers, REST API routes, or shortcodes, which significantly limits its external attack surface. The absence of dangerous functions and external HTTP requests are also favorable indicators. Furthermore, all SQL queries utilize prepared statements, a crucial security practice for preventing SQL injection. However, several significant concerns arise from the analysis. The most alarming is the presence of a flow with unsanitized paths identified in the taint analysis, which, even without a critical or high severity rating, represents a potential avenue for attack. The fact that 100% of output is unescaped is a major red flag, opening the door to Cross-Site Scripting (XSS) vulnerabilities, especially given the plugin performs file operations. The vulnerability history, with one unpatched medium severity CVE, indicates a recurring issue and a lack of timely patching by the developer. This, combined with the lack of nonce checks and potentially insufficient capability checks (only 2 detected for 6 file operations), suggests a need for more robust security controls.

Key Concerns

  • Unpatched medium severity CVE
  • Flow with unsanitized paths
  • 100% of output unescaped
  • No nonce checks detected
  • Capability checks for file operations may be insufficient
Vulnerabilities
1

Varnish WordPress Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-31616medium · 6.1Cross-Site Request Forgery (CSRF)

Varnish WordPress <= 1.7 - Cross-Site Request Forgery to Stored Cross-Site Scripting

Mar 31, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Varnish WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
6
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
varnish_admin_interface (varnish-wordpress.php:258)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Varnish WordPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionswitch_themevarnish-wordpress.php:82
actiontransition_post_statusvarnish-wordpress.php:83
actionshutdownvarnish-wordpress.php:86
actionadmin_menuvarnish-wordpress.php:92
Maintenance & Trust

Varnish WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedFeb 20, 2018
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs70
Developer Profile

Varnish WordPress Developer Profile

AdminGeekZ

1 plugin · 70 total installs

69
trust score
Avg Security Score
64/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Varnish WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/varnish-wp/css/style.css

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Varnish WordPress