WP Compiler Security & Risk Analysis

wordpress.org/plugins/wp-compiler

Harness the power of pre-processed CSS and minified JS in your theme or plugin, without any complicated installs or build tools.

1K active installs v1.0.0 PHP 5.6+ WP 4.8+ Updated Oct 22, 2018
compiledlesssassscssstyles
63
C · Use Caution
CVEs total1
Unpatched1
Last CVESep 22, 2025
Safety Verdict

Is WP Compiler Safe to Use in 2026?

Use With Caution

Score 63/100

WP Compiler has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Sep 22, 2025Updated 7yr ago
Risk Assessment

The wp-compiler v1.0.0 plugin exhibits a mixed security posture. On one hand, the static analysis reveals a promising absence of direct attack surface entry points like AJAX handlers, REST API routes, shortcodes, and cron events that lack authentication or permission checks. Furthermore, all SQL queries are properly prepared, indicating good database interaction practices. However, there are significant concerns regarding output escaping, with only 32% of outputs being properly escaped, which could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled carefully. The presence of two taint flows with unsanitized paths, even if not classified as critical or high severity, warrants attention as it suggests potential injection risks.

The vulnerability history is a major red flag. The plugin has a documented medium severity CVE that remains unpatched, and the common vulnerability type being Cross-Site Request Forgery (CSRF) suggests a pattern of insecure handling of user actions. The existence of an unpatched vulnerability, especially one from a relatively recent date, indicates a lack of ongoing maintenance and proactive security patching.

In conclusion, while the plugin avoids common pitfalls like direct unauthenticated entry points and raw SQL, the insufficient output escaping, identified taint flows, and particularly the unpatched historical vulnerability point to a significant risk. The plugin's strengths lie in its limited attack surface and secure database practices, but its weaknesses in output sanitization and vulnerability management are critical concerns that outweigh these positives.

Key Concerns

  • Unpatched medium severity CVE
  • Taint flows with unsanitized paths
  • Low percentage of properly escaped output
  • No nonce checks
  • No capability checks
Vulnerabilities
1

WP Compiler Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-58032medium · 4.3Cross-Site Request Forgery (CSRF)

WP Compiler <= 1.0.0 - Cross-Site Request Forgery

Sep 22, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

WP Compiler Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
7 escaped
Nonce Checks
0
Capability Checks
0
File Operations
9
External Requests
0
Bundled Libraries
0

Output Escaping

32% escaped22 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
redirect_to_referrer (wp-compiler.php:238)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Compiler Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 16
actioninitwp-compiler.php:43
actionadmin_bar_menuwp-compiler.php:44
actionadmin_post_wp_compiler_compilewp-compiler.php:45
actionadmin_post_wp_compiler_compile_dev_modewp-compiler.php:46
actionadmin_headwp-compiler.php:47
actionwp_headwp-compiler.php:48
filterwp_compiler_dev_modewp-compiler.php:49
filterwp_compiler_script_versionwp-compiler.php:50
filterwp_compiler_style_versionwp-compiler.php:51
filterbbytes_dev_utils_dev_modewp-compiler.php:52
filterbbytes_compiler_script_versionwp-compiler.php:53
filterbbytes_compiler_style_versionwp-compiler.php:54
actionadmin_menuwp-compiler.php:55
actionadmin_initwp-compiler.php:56
actionadmin_footerwp-compiler.php:57
actionadmin_noticeswp-compiler.php:58
Maintenance & Trust

WP Compiler Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedOct 22, 2018
PHP min version5.6
Downloads4K

Community Trust

Rating100/100
Number of ratings6
Active installs1K
Developer Profile

WP Compiler Developer Profile

Bytes.co

4 plugins · 5K total installs

81
trust score
Avg Security Score
81/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Compiler

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-compiler/includes/css/admin-styles.css
Script Paths
/wp-content/plugins/wp-compiler/includes/js/settingsPage.js

HTML / DOM Fingerprints

CSS Classes
wp_compiler_compilewp_compiler_dev_mode_onwp_compiler_compile_dev_mode
FAQ

Frequently Asked Questions about WP Compiler