WPO Enhancements Security & Risk Analysis

wordpress.org/plugins/wpo-enhancements

Some tricks and tips to rock our website. Depends on WP Rocket plugin. Adjust some options and improve Core Web Vitals score on Page Speed Insights.

0 active installs v2.0.11 PHP 7.0+ WP 4.9+ Updated Jan 13, 2021
cdnenhancementsoptimizationspeedwpo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPO Enhancements Safe to Use in 2026?

Generally Safe

Score 85/100

WPO Enhancements has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "wpo-enhancements" v2.0.11 plugin exhibits a strong security posture based on the provided static analysis. The complete absence of direct entry points like AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the code shows good practices in handling SQL queries, with 100% utilizing prepared statements, and a high rate of output escaping (82%), mitigating common injection vulnerabilities. The lack of external HTTP requests and the presence of a capability check are also positive indicators.

However, there are a few areas that warrant attention. The fact that there are 0 AJAX handlers and 0 REST API routes without authentication checks is good, but the absolute absence of any such handlers or routes might indicate a plugin that is very limited in functionality or one where this analysis may have missed potential interaction points. The presence of file operations without explicit detail on their nature could pose a risk if not handled with extreme care. Crucially, the complete lack of nonce checks across all identified entry points (if any were present and analyzed) is a notable weakness. While the static analysis shows 0 total flows analyzed by taint analysis, which is itself a neutral observation, the vulnerability history is completely clean, indicating a strong track record.

Overall, the plugin appears robust with no known vulnerabilities or critical code signals pointing to immediate threats. The primary concerns stem from the potential for unknown entry points and the complete absence of nonce checks, which is a fundamental security measure for preventing CSRF attacks if any user-interactive features exist that were not explicitly categorized as AJAX, REST, or shortcodes in this analysis. The strength lies in its minimal attack surface and good SQL/output handling.

Key Concerns

  • No nonce checks found
  • Some outputs not properly escaped
Vulnerabilities
None known

WPO Enhancements Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WPO Enhancements Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
14 escaped
Nonce Checks
0
Capability Checks
1
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

82% escaped17 total outputs
Attack Surface

WPO Enhancements Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionadmin_initsrc\backend.php:14
actionadmin_menusrc\backend.php:15
actionwp_headsrc\frontend.php:26
actionwp_footersrc\frontend.php:30
actionwp_enqueue_scriptssrc\frontend.php:34
filterrocket_buffersrc\frontend.php:38
filterrocket_buffersrc\frontend.php:39
actioninitsrc\frontend.php:42
actionwp_enqueue_scriptssrc\frontend.php:43
actiontemplate_redirectsrc\frontend.php:75
Maintenance & Trust

WPO Enhancements Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedJan 13, 2021
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

WPO Enhancements Developer Profile

David Garcia

11 plugins · 90 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WPO Enhancements

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpo-enhancements/assets/css/wpo-enhancements.css/wp-content/plugins/wpo-enhancements/assets/js/wpo-enhancements.js
Script Paths
/wp-content/plugins/wpo-enhancements/assets/js/wpo-enhancements.js
Version Parameters
wpo-enhancements/assets/css/wpo-enhancements.css?ver=wpo-enhancements/assets/js/wpo-enhancements.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpo-enhancements-delay-js-wrapper
Data Attributes
data-wpo-enhancements-lazy-load-delay
JS Globals
wpo_enhancements_settingsdoLoadFontsExecuteddoLoadFonts
FAQ

Frequently Asked Questions about WPO Enhancements