WP Booster Security & Risk Analysis

wordpress.org/plugins/wp-booster

WP-Booster - Optimize your website to load very fast & efficiently by combining & minify JS, CSS, lazy-load images, and leverage browser cachi …

10 active installs v1.0.0 PHP 5.6+ WP 4.4+ Updated Apr 30, 2020
boosterminifyoptimizespeedupwp-booster
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Booster Safe to Use in 2026?

Generally Safe

Score 85/100

WP Booster has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "wp-booster" v1.0.0 plugin demonstrates a generally good security posture, with no known past vulnerabilities and a limited attack surface. The absence of dangerous functions, raw SQL queries, and a low number of AJAX handlers are positive indicators. The plugin also shows a reasonable attempt at secure coding practices with the presence of nonce checks and prepared statements for SQL queries.

However, there are areas of concern that detract from an otherwise strong security profile. The output escaping is only 54% proper, indicating a potential for cross-site scripting (XSS) vulnerabilities. Furthermore, the taint analysis reveals two flows with unsanitized paths, which, while not classified as critical or high severity in this analysis, represent a significant risk as they could be leveraged by attackers to execute malicious code or access sensitive information if not properly handled. The lack of capability checks on the single AJAX handler is also a notable weakness, potentially allowing unauthenticated users to trigger plugin functionality.

In conclusion, while "wp-booster" v1.0.0 has a clean vulnerability history and a small attack surface, the identified issues with output escaping and unsanitized taint flows, along with the absence of capability checks on its AJAX endpoint, warrant attention. Addressing these specific weaknesses would significantly improve the plugin's overall security and reduce its exploitability.

Key Concerns

  • Unescaped output detected
  • Flows with unsanitized paths found
  • AJAX handler lacks capability checks
Vulnerabilities
None known

WP Booster Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP Booster Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

WP Booster Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
13
15 escaped
Nonce Checks
1
Capability Checks
0
File Operations
15
External Requests
1
Bundled Libraries
0

Output Escaping

54% escaped28 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

4 flows2 with unsanitized paths
combine (inc\class-wpboostercombined.php:21)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Booster Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_wpb_update_settinginc\class-wpboostersetting.php:26
WordPress Hooks 10
actionadmin_enqueue_scriptsinc\class-wpbooster.php:34
actionwp_headinc\class-wpboosterfrontend.php:18
filterscript_loader_srcinc\class-wpboosterfrontend.php:21
filterstyle_loader_srcinc\class-wpboosterfrontend.php:22
actionwp_enqueue_scriptsinc\class-wpboosterfrontend.php:32
actionwp_footerinc\class-wpboosterfrontend.php:36
filterthe_contentinc\class-wpboosterfrontend.php:45
actionadmin_menuinc\class-wpboostersetting.php:24
actionadmin_initinc\class-wpboostersetting.php:25
actionadmin_noticeswp-booster.php:50
Maintenance & Trust

WP Booster Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedApr 30, 2020
PHP min version5.6
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Booster Developer Profile

M A Monim

2 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Booster

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-booster/css/wp-booster-admin.css/wp-content/plugins/wp-booster/js/wp-booster-admin.js/wp-content/plugins/wp-booster/js/jquery.lazyload.min.js
Script Paths
/wp-content/plugins/wp-booster/js/wp-booster-admin.js
Version Parameters
wp-booster-admin.css?ver=wp-booster-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
lazy
Data Attributes
data-original
JS Globals
jQuerywpBoosterWPBooster
FAQ

Frequently Asked Questions about WP Booster