WebP Express Plus Security & Risk Analysis

wordpress.org/plugins/webp-express-plus

Exclusion of necessary images from processing by the "WebP Express" plugin

800 active installs v0.2.1 PHP 5.6+ WP 4.0+ Updated Nov 24, 2022
imagesperformancespeedwebpwebp-express
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WebP Express Plus Safe to Use in 2026?

Generally Safe

Score 85/100

WebP Express Plus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "webp-express-plus" v0.2.1 plugin presents a mixed security profile. From a static analysis perspective, the plugin exhibits a commendable lack of readily identifiable attack surface points such as unprotected AJAX handlers, REST API routes, or shortcodes. Furthermore, all observed SQL queries utilize prepared statements, which is a strong indicator of secure database interaction. However, a significant concern lies in the low percentage (17%) of properly escaped output, suggesting a high potential for cross-site scripting (XSS) vulnerabilities. The absence of nonce checks and capability checks on any identified entry points, while seemingly limited by the zero entry points, means that if any entry points are later introduced or discovered, they will lack fundamental security protections.

The vulnerability history for this plugin is clean, with no recorded CVEs. This is a positive indicator and suggests a good track record regarding security vulnerabilities. However, it is important to note that a clean history does not guarantee future security, especially in light of the identified output escaping issues. The lack of taint analysis results is likely due to the limited or non-existent attack surface exposed, making it difficult to trace data flow in this assessment. In conclusion, while the plugin has a good foundation with secure SQL handling and no known vulnerabilities, the prevalent issue of unescaped output represents a substantial risk that needs immediate attention.

Key Concerns

  • Low output escaping percentage
  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

WebP Express Plus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WebP Express Plus Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
5
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
6
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

17% escaped6 total outputs
Attack Surface

WebP Express Plus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menuindex.php:21
actionadmin_initindex.php:63
actionupdate_option_webp_express_plus_rulesindex.php:77
actionwp_headindex.php:126
actionwp_footerindex.php:130
Maintenance & Trust

WebP Express Plus Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedNov 24, 2022
PHP min version5.6
Downloads9K

Community Trust

Rating100/100
Number of ratings1
Active installs800
Developer Profile

WebP Express Plus Developer Profile

WP01

1 plugin · 800 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WebP Express Plus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/webp-express-plus/simple_html_dom/simple_html_dom.php

HTML / DOM Fingerprints

CSS Classes
webpexpress-processed
FAQ

Frequently Asked Questions about WebP Express Plus