WP Core Update Cleaner Security & Risk Analysis

wordpress.org/plugins/wp-core-update-cleaner

This plugin automatically removes some files in the root folder, like wp-config-sample.php, readme and license files, when WordPress is manually or au …

900 active installs v1.2.0 PHP + WP 3.3+ Updated Mar 19, 2024
coreupdateupgrade
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WP Core Update Cleaner Safe to Use in 2026?

Generally Safe

Score 85/100

WP Core Update Cleaner has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "wp-core-update-cleaner" v1.2.0 plugin exhibits a strong security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the potential attack surface. Furthermore, the code signals indicate good development practices, with no dangerous functions, all SQL queries using prepared statements, and all outputs properly escaped. The plugin also avoids external HTTP requests, which can be a common vector for vulnerabilities.

The taint analysis reports zero flows, suggesting that user-supplied data is not being processed in a way that could lead to common vulnerabilities like path traversal or command injection. The clean vulnerability history, with zero recorded CVEs of any severity, further reinforces the impression of a secure plugin. The lack of nonces and capability checks, while typically a concern, is less critical here given the minimal attack surface and the plugin's likely function of performing background cleanup tasks that may not require explicit user interaction or fine-grained permissions.

In conclusion, this plugin appears to be well-secured with no immediate exploitable vulnerabilities identified in the static analysis or its history. Its strengths lie in its limited attack surface and adherence to secure coding practices for the operations it performs. The only potential area for improvement, though not a critical risk in this context, would be the implementation of capability checks if its functionality were to expand in the future.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP Core Update Cleaner Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP Core Update Cleaner Release Timeline

v1.2.0Current
v1.1.0
v1.0
Code Analysis
Analyzed Mar 16, 2026

WP Core Update Cleaner Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0
Attack Surface

WP Core Update Cleaner Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_initwp-core-update-cleaner.php:41
action_core_updated_successfullywp-core-update-cleaner.php:42
Maintenance & Trust

WP Core Update Cleaner Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMar 19, 2024
PHP min version
Downloads9K

Community Trust

Rating90/100
Number of ratings4
Active installs900
Developer Profile

WP Core Update Cleaner Developer Profile

Upperdog

3 plugins · 37K total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Core Update Cleaner

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Core Update Cleaner