Super Page Cache
Slug: wp-cloudflare-page-cache · Optimole · 60,000+
Overall Score
Good overall quality
What this score means
Scores are calculated on a 100-point scale by analysing six weighted categories: Security, WP.org Readiness, Performance, Code Quality, Accessibility, and Vulnerabilities.
-
Excellent The plugin follows best practices across every measured category. It is well-maintained, low-risk, and recommended for production use.
-
Good Strong overall quality with minor areas for improvement. Generally safe to use on most sites.
-
Needs Review Some areas of concern detected. Review the full issues report and weigh the risks before installing on production.
-
High Risk Significant quality or security problems found. Exercise caution — check the details carefully before using this plugin.
- Wordfence: May 21, 2026 11:33 pm (2 minutes ago)
Score Breakdown
Why this score?
Top deductions are based on 1 affected rules, reducing this category by 40 total points.
| Rule | Hits | Impact | Share |
|---|---|---|---|
| Security issue: Warning | 10 | -40 | 100% |
Why this score?
Top deductions are based on 2 affected rules, reducing this category by 4 total points.
| Rule | Hits | Impact | Share |
|---|---|---|---|
| Tested up to version is behind current WordPress | 1 | -3 | 75% |
| Repo issue: Notice | 1 | -1 | 25% |
Why this score?
Top deductions are based on 0 affected rules, reducing this category by 0 total points.
No deductions were applied for this category in the latest score run.
Why this score?
Top deductions are based on 0 affected rules, reducing this category by 0 total points.
No deductions were applied for this category in the latest score run.
Why this score?
Top deductions are based on 1 affected rules, reducing this category by 2 total points.
| Rule | Hits | Impact | Share |
|---|---|---|---|
| Accessibility issue: Warning | 1 | -2 | 100% |
Why this score?
Top deductions are based on 0 affected rules, reducing this category by 0 total points.
No deductions were applied for this category in the latest score run.
Plugin Details
- Version: 5.2.4
- Active Installs: 60,000+
- Last Updated: 2026-04-13 13:57:00
- Tested up to: 6.9.4
- Requires PHP: 7.4
- Rating: 4.8/5 (491 ratings)
- Support: 16/16 resolved (100%)
- View on WordPress.org
- Download Plugin
Scan Summary
- Errors: 0
- Warnings: 11
- Notices: 1
- Last Scanned: 2026-05-21 18:55:46
What Changed Since Last Scan
New Issues
No items in this category.
Resolved Issues
No items in this category.
Worsened Issues
No items in this category.
Detected Issues
| Severity | Category | Message | File | Fix Guidance |
|---|---|---|---|---|
| NOTICE | REPO | Main plugin file does not declare a Domain Path header. | wp-cloudflare-super-page-cache.php |
Quick
Add a Domain Path header if language files are stored in a languages directory.
Moderate
Apply the same remediation pattern across repo findings and re-scan to confirm notice issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Main plugin file does not appear to guard direct access with an ABSPATH check. | wp-cloudflare-super-page-cache.php |
Quick
Add an ABSPATH guard near the top of the main plugin file to prevent direct execution.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | SECURITY | Use of unserialize() detected. | bootstrap.php |
Quick
Switch the flagged payload to JSON decoding where practical.
Moderate
If serialization is required, enforce allowed_classes=false and strict input validation before parsing.
Advanced
Move state transfer to signed/typed schemas and add security tests for malformed payloads.
|
| WARNING | SECURITY | Use of base64_decode() detected. | src/Modules/Rest_Server.php |
Quick
Ensure any encoded payloads are necessary, documented, and never used to obscure executable logic.
Moderate
Apply the same remediation pattern across security findings and re-scan to confirm warning issues drop.
Advanced
Add automated linting, CI checks, and team review guidance so this issue class is prevented in future releases.
|
| WARNING | ACCESSIBILITY | Image markup without an alt attribute detected. | src/Modules/Admin.php |
Quick
Add alt attributes to the flagged image tags, or alt="" for decorative images.
Moderate
Audit all templates/components for missing alternative text and update content guidelines.
Advanced
Integrate accessibility testing in CI (axe/pa11y) and block releases with critical a11y violations.
|
| WARNING | SECURITY | Direct database query detected without an immediately visible $wpdb->prepare() wrapper. | src/Modules/Database_Optimization.php |
Quick
Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate
Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced
Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
|
| WARNING | SECURITY | Direct database query detected without an immediately visible $wpdb->prepare() wrapper. | src/Models/Asset_Rules.php |
Quick
Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate
Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced
Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
|
| WARNING | SECURITY | Raw superglobal access detected. | src/Utils/Helpers.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Raw superglobal access detected. | libs/logs.class.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Raw superglobal access detected. | libs/backend.class.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Raw superglobal access detected. | libs/cache_controller.class.php |
Quick
Wrap direct request values with sanitization and nonce verification in the affected code path.
Moderate
Centralize request normalization in helper methods so handlers consume validated input only.
Advanced
Adopt typed request DTOs and automated security lint checks for unsanitized superglobal access.
|
| WARNING | SECURITY | Direct database query detected without an immediately visible $wpdb->prepare() wrapper. | uninstall.php |
Quick
Wrap dynamic SQL arguments with $wpdb->prepare() in the flagged query.
Moderate
Refactor repeated SQL into repository/helper methods that enforce prepared statements by default.
Advanced
Add integration tests and static checks that fail builds when direct dynamic SQL is introduced.
|
Score History
Range Change: -1 pts · All-Time High: 89/100