WP Fast Minify Security & Risk Analysis

wordpress.org/plugins/wp-inline-js-converter

Compress HTML Code, And Converting Inline Script and Style To JavaScript and CSS Compressed File.

10 active installs v1.5.1 PHP + WP 3.9+ Updated May 27, 2021
csshtmljavascriptjsminify
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Fast Minify Safe to Use in 2026?

Generally Safe

Score 85/100

WP Fast Minify has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "wp-inline-js-converter" v1.5.1 plugin exhibits a generally positive security posture based on the static analysis, with no critical or high-severity code signals, no known vulnerabilities, and a lack of dangerous functions or direct SQL injection risks. The complete absence of exploitable entry points like AJAX handlers, REST API routes, shortcodes, and cron events, especially unprotected ones, is a significant strength. Furthermore, all SQL queries utilize prepared statements, indicating good database interaction practices. The vulnerability history being completely clear reinforces this positive impression.

However, a notable concern arises from the output escaping. With 20 total outputs and 0% properly escaped, there's a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data rendered to the user interface without proper sanitization could be exploited. While taint analysis found no unsanitized paths, this is based on a limited number of flows (2), and the lack of output escaping creates a broad vulnerability surface that could be triggered by unexpected input. The presence of file operations (3) without explicit mention of security checks also warrants caution, as they could potentially be abused if not handled securely.

In conclusion, the plugin benefits from a very small attack surface and secure database practices. Its clean vulnerability history is a strong indicator of past security diligence. The primary weakness lies in the complete lack of output escaping, which presents a significant XSS risk that overshadows its other strengths. Further investigation into the file operations would also be prudent.

Key Concerns

  • No output escaping
  • File operations present without explicit security context
Vulnerabilities
None known

WP Fast Minify Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Fast Minify Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
20
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped20 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
wp_inline_js_converter_menu_options (admin\admin_page.php:20)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Fast Minify Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuadmin\admin_page.php:9
actionplugins_loadedwp-inline-js-converter.php:111
Maintenance & Trust

WP Fast Minify Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedMay 27, 2021
PHP min version
Downloads6K

Community Trust

Rating60/100
Number of ratings2
Active installs10
Developer Profile

WP Fast Minify Developer Profile

sakaitaka

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Fast Minify

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-inline-js-converter/cache/

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Fast Minify