
WP Clean Security & Risk Analysis
wordpress.org/plugins/wp-cleanПлагин WP-Clean предоставляет большое количество функций для оптимизации, безопасности и удаления лишних файлов (кода) в WordPress.
Is WP Clean Safe to Use in 2026?
Generally Safe
Score 85/100WP Clean has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wp-clean" v2.0 plugin exhibits a mixed security posture. While it boasts zero known CVEs and a clean vulnerability history, indicating a potentially mature and stable codebase, the static analysis reveals significant concerns. The presence of five instances of `create_function`, a deprecated and insecure PHP function, is a major red flag. This function can be easily exploited to execute arbitrary code if any user-controllable input is passed to it without proper sanitization.
Furthermore, the taint analysis identified two flows with unsanitized paths, which, combined with the use of `create_function`, presents a plausible pathway for code injection vulnerabilities. The absence of nonce checks and capability checks on any entry points is also concerning, as it means that any user, regardless of their role or authentication status, could potentially trigger plugin actions if an entry point were discovered. The 67% output escaping rate, while not terrible, still leaves room for potential cross-site scripting (XSS) vulnerabilities in unescaped outputs.
Despite the lack of recorded vulnerabilities, the identified code signals and taint flows indicate inherent risks that have not yet been exploited or discovered. The plugin would benefit from refactoring to remove `create_function`, implementing robust input validation and sanitization, and adding nonce and capability checks to all potential entry points to improve its overall security. The absence of external HTTP requests and raw SQL queries using prepared statements are positive aspects.
Key Concerns
- Use of deprecated and dangerous create_function
- Taint flows with unsanitized paths
- Missing nonce checks on all entry points
- Missing capability checks on all entry points
- Unescaped output (33% of total)
WP Clean Security Vulnerabilities
WP Clean Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
WP Clean Attack Surface
WordPress Hooks 108
Maintenance & Trust
WP Clean Maintenance & Trust
Maintenance Signals
Community Trust
WP Clean Alternatives
wp_head() cleaner
wp-head-cleaner
Remove unused tags from wp_head() output.
Remove WordPress Overhead
remove-wp-overhead
Remove overhead from the HTML, speed up your website and disable widgets you don't use
Native WP Cleaner
native-wp-cleaner
Disable native widgets, clean head tag from RSS, RSD, WLW Manifest links, disable XML-RPC, cleanup admin panel from columns, metaboxes, menu items.
Head Trimmer
head-trimmer
Customizable plugin to selectively remove WordPress version information, feeds, shortlinks, xmlrpc, emoji support and other miscellaneous extras from …
Advanced Database Cleaner – Optimize & Clean Database to Speed Up Site Performance
advanced-database-cleaner
Clean database by deleting orphaned data such as 'revisions', 'expired transients', optimize database and more...
WP Clean Developer Profile
7 plugins · 140 total installs
How We Detect WP Clean
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-clean/css/wpclean-style.csswpclean-style-pluginHTML / DOM Fingerprints
Copyright 2016 Artem Sannikov (email : info@artemsannikov.ru)This program is free software; you can redistribute it and/or modifyit under the terms of the GNU General Public License, version 2, aspublished by the Free Software Foundation.+53 more