ACF WYSIWYG Styling Security & Risk Analysis

wordpress.org/plugins/acf-wysiwyg-styling

Provides the necessary CSS classes in ACF WYSYWIG editor to allow for complete styling of the admin interface.

80 active installs v1.0 PHP + WP 3.5.0+ Updated Aug 27, 2015
acfstylestylesstylingwysiwyg
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is ACF WYSIWYG Styling Safe to Use in 2026?

Generally Safe

Score 85/100

ACF WYSIWYG Styling has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The security posture of the "acf-wysiwyg-styling" v1.0 plugin appears to be generally good in several key areas. The static analysis reveals a complete absence of identified entry points like AJAX handlers, REST API routes, shortcodes, or cron events. This significantly limits the potential attack surface. Furthermore, the plugin demonstrates excellent practices regarding SQL queries, with all 100% using prepared statements, and no dangerous functions or file operations were detected. The vulnerability history is also clear, with no known CVEs, indicating a history of secure development or effective patching.

However, a critical concern arises from the output escaping analysis. With 100% of its single output not being properly escaped, this plugin presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users, if not properly sanitized, could be manipulated to inject malicious scripts. The lack of nonce checks and capability checks across all identified entry points (though there are none) also contributes to this concern, as these are fundamental security mechanisms that should ideally be present even in a seemingly limited attack surface. While the absence of direct vulnerabilities in its history is positive, the identified output escaping issue needs immediate attention as it's a common vector for exploitation.

Key Concerns

  • 100% of outputs not properly escaped
  • No nonce checks on identified entry points
  • No capability checks on identified entry points
Vulnerabilities
None known

ACF WYSIWYG Styling Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

ACF WYSIWYG Styling Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

ACF WYSIWYG Styling Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionacf/input/admin_footerindex.php:15
Maintenance & Trust

ACF WYSIWYG Styling Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedAug 27, 2015
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs80
Developer Profile

ACF WYSIWYG Styling Developer Profile

delwinv

1 plugin · 80 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ACF WYSIWYG Styling

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/acf-wysiwyg-styling/js/acf-wysiwyg-styling.js
Script Paths
/wp-content/plugins/acf-wysiwyg-styling/js/acf-wysiwyg-styling.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about ACF WYSIWYG Styling