WP Static Cache Security & Risk Analysis

wordpress.org/plugins/wp-static-cache

A very simple & fast caching engine for WordPress that produces static html files for your site.

10 active installs v1.0.0 PHP + WP 3.0.1+ Updated Nov 2, 2016
cachecachingperformancestatic-cache
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Static Cache Safe to Use in 2026?

Generally Safe

Score 85/100

WP Static Cache has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The wp-static-cache plugin v1.0.0 exhibits a generally good security posture with no known vulnerabilities and a limited attack surface. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly reduces potential entry points for attackers. Furthermore, all SQL queries utilize prepared statements, and there are no external HTTP requests, which are excellent security practices.

However, a significant concern arises from the output escaping analysis, where 100% of the 14 identified outputs are not properly escaped. This presents a high risk of cross-site scripting (XSS) vulnerabilities, as user-supplied data could be injected into the output and executed by the user's browser. The taint analysis also revealed one flow with an unsanitized path, which could potentially lead to directory traversal or other file system related vulnerabilities, though its severity is not specified. The lack of nonce checks on file operations, coupled with two capability checks but no explicit nonce checks on other potential entry points, also warrants attention.

While the plugin's vulnerability history is clean, this is primarily in the context of its limited scope. The unescaped output is a critical flaw that needs immediate attention. The plugin shows promise with its minimal attack surface and secure SQL handling, but the lack of output escaping is a substantial weakness that negates many of its strengths and requires mitigation.

Key Concerns

  • 100% of outputs unescaped
  • Taint flow with unsanitized path
  • No nonce checks on file operations
Vulnerabilities
None known

WP Static Cache Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Static Cache Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
18
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped14 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

5 flows1 with unsanitized paths
<core> (core\core.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Static Cache Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menucache-mgr.php:173
Maintenance & Trust

WP Static Cache Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedNov 2, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Static Cache Developer Profile

blode

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Static Cache

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-static-cache/advanced-cache.php/wp-content/plugins/wp-static-cache/core/inc.php

HTML / DOM Fingerprints

HTML Comments
<!--Added by WP-Static-Cache-->
FAQ

Frequently Asked Questions about WP Static Cache