WP CDN Rewrite Security & Risk Analysis

wordpress.org/plugins/wp-cdn-rewrite

Rewrite the root url of assets, css, and js files.

100 active installs v0.4.0 PHP + WP 3.3+ Updated Sep 27, 2016
cdnrewrite
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP CDN Rewrite Safe to Use in 2026?

Generally Safe

Score 85/100

WP CDN Rewrite has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The plugin "wp-cdn-rewrite" v0.4.0 exhibits a strong security posture based on the provided static analysis. There are no detected dangerous functions, file operations, or external HTTP requests, and all SQL queries utilize prepared statements. The absence of any identified vulnerability history, including CVEs, further suggests a well-maintained and secure codebase. The plugin also correctly handles output escaping, indicating a good practice in preventing cross-site scripting vulnerabilities.

While the attack surface appears to be zero with no AJAX handlers, REST API routes, shortcodes, or cron events, this also means there are no discernible entry points for the plugin's functionality. This could imply a very minimal or niche purpose for the plugin. The complete lack of capability checks and nonce checks is a concern, as it implies that even if functionality were to be added in the future, these critical security checks might be overlooked. However, given the current lack of entry points, this risk is theoretical at this stage.

In conclusion, the plugin demonstrates excellent adherence to secure coding practices regarding data handling and output. The absence of vulnerabilities in its history is a significant positive. The primary weakness lies in the potential for future development to introduce risks due to the complete absence of capability and nonce checks, a pattern that should be addressed if the plugin's functionality expands. For its current state, the security is very high, but there's room for improvement in foundational security checks.

Key Concerns

  • No capability checks detected
  • No nonce checks detected
Vulnerabilities
None known

WP CDN Rewrite Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP CDN Rewrite Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

WP CDN Rewrite Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_noticeswp-cdn-rewrite-core.php:43
actioninitwp-cdn-rewrite-core.php:232
filterstyle_loader_srcwp-cdn-rewrite-core.php:244
filterscript_loader_srcwp-cdn-rewrite-core.php:245
filterstylesheet_uriwp-cdn-rewrite-core.php:246
actioninitwp-cdn-rewrite-core.php:279
Maintenance & Trust

WP CDN Rewrite Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedSep 27, 2016
PHP min version
Downloads21K

Community Trust

Rating88/100
Number of ratings9
Active installs100
Developer Profile

WP CDN Rewrite Developer Profile

Chris Scott

2 plugins · 20K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP CDN Rewrite

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-cdn-rewrite/

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP CDN Rewrite