Add Admin CSS Security & Risk Analysis

wordpress.org/plugins/add-admin-css

Easily define additional CSS (inline and/or by URL) to be added to all administration pages.

10K active installs v2.5.1 PHP + WP 5.5+ Updated Dec 8, 2025
adminadmin-themecssstylestylesheets
99
A · Safe
CVEs total1
Unpatched0
Last CVEJul 26, 2024
Safety Verdict

Is Add Admin CSS Safe to Use in 2026?

Generally Safe

Score 99/100

Add Admin CSS has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Jul 26, 2024Updated 5mo ago
Risk Assessment

The add-admin-css plugin, version 2.5.1, exhibits a mixed security posture. On the positive side, it has a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events exposed. The plugin also demonstrates good practices regarding SQL queries, with 100% using prepared statements, and a high percentage of output escaping. However, several concerns warrant attention.

The static analysis revealed a single 'dangerous function' usage: unserialize. While the data doesn't explicitly show how this function is used or if it's exposed to untrusted input, the presence of unserialize is a red flag. It's crucial to ensure that any data being unserialized is rigorously validated and comes from trusted sources to prevent object injection vulnerabilities.

The vulnerability history, particularly the medium severity CVE related to Exposure of Sensitive Information to an Unauthorized Actor, dated very recently, is a significant concern. Even though it's currently patched, this indicates a past weakness that could be exploited if not addressed thoroughly or if similar flaws exist. The absence of any direct taint analysis results with critical or high severity is a positive sign, but it doesn't entirely negate the risks posed by the unserialize function or past vulnerabilities.

Key Concerns

  • Presence of 'unserialize' function
  • Recent medium severity CVE (sensitive info exposure)
Vulnerabilities
1 published

Add Admin CSS Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-6547medium · 5.3Exposure of Sensitive Information to an Unauthorized Actor

Add Admin CSS <= 2.0.1 - Unauthenticated Full Path Dislcosure

Jul 26, 2024 Patched in 2.5 (278d)
Version History

Add Admin CSS Release Timeline

v2.5.1Current
v2.5
v2.0.11 CVE
v2.01 CVE
v1.9.11 CVE
v1.91 CVE
v1.81 CVE
v1.71 CVE
v1.61 CVE
v1.41 CVE
v1.3.41 CVE
v1.3.31 CVE
v1.3.21 CVE
v1.3.11 CVE
v1.31 CVE
v1.21 CVE
v1.11 CVE
Code Analysis
Analyzed Mar 16, 2026

Add Admin CSS Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
9
56 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$plugins = unserialize( $r['body']['plugins'] );c2c-plugin.php:361

Output Escaping

86% escaped65 total outputs
Attack Surface

Add Admin CSS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 15
actionadmin_initadd-admin-css.php:187
actionadmin_headadd-admin-css.php:188
actionadmin_noticesadd-admin-css.php:189
actionadmin_noticesadd-admin-css.php:190
actionadmin_enqueue_scriptsadd-admin-css.php:191
filterwp_redirectadd-admin-css.php:192
actionplugins_loadedadd-admin-css.php:676
actioninitc2c-plugin.php:188
actionadmin_initc2c-plugin.php:191
actionadmin_headc2c-plugin.php:192
filterplugin_row_metac2c-plugin.php:252
filterhttp_request_argsc2c-plugin.php:255
actionadmin_menuc2c-plugin.php:259
filtercontextual_helpc2c-plugin.php:262
actionadmin_enqueue_scriptsc2c-plugin.php:264
Maintenance & Trust

Add Admin CSS Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 8, 2025
PHP min version
Downloads141K

Community Trust

Rating98/100
Number of ratings35
Active installs10K
Developer Profile

Add Admin CSS Developer Profile

Scott Reilly

63 plugins · 92K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
374 days
View full developer profile
Detection Fingerprints

How We Detect Add Admin CSS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/add-admin-css/
Version Parameters
add-admin-css/style.css?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- This plugin is disabled. -->
Data Attributes
data-c2c-add-admin-css
JS Globals
window.c2c_AddAdminCSS
FAQ

Frequently Asked Questions about Add Admin CSS