Add Code To Head Security & Risk Analysis

wordpress.org/plugins/add-code-to-head

Add custom Javascript/HTML/CSS codes to the page head without editing the template.

3K active installs v1.17 PHP + WP 3.3.2+ Updated Mar 26, 2025
codecssjavascripttemplate
70
B · Generally Safe
CVEs total1
Unpatched1
Last CVEAug 25, 2025
Safety Verdict

Is Add Code To Head Safe to Use in 2026?

Mostly Safe

Score 70/100

Add Code To Head is generally safe to use though it hasn't been updated recently. 1 past CVE were resolved. Keep it updated.

1 known CVE 1 unpatched Last CVE: Aug 25, 2025Updated 1yr ago
Risk Assessment

The "add-code-to-head" plugin v1.17 exhibits a mixed security posture. While the static analysis reveals no immediate critical vulnerabilities in terms of attack surface, dangerous functions, or taint flows, the vulnerability history is a significant concern. The presence of one unpatched medium severity CVE, specifically a Cross-Site Scripting (XSS) vulnerability, indicates a past failure in code sanitization or input validation that has not yet been addressed. This historical pattern, coupled with the lack of demonstrated nonce and capability checks in the static analysis, raises questions about the plugin's overall robustness and its ability to prevent future similar issues. Although the plugin claims 100% output escaping, the unpatched XSS vulnerability suggests this might not be consistently applied or that the vulnerability exploited a different vector.

Despite the lack of an immediately apparent exploitable attack surface in the provided static analysis, the unpatched vulnerability is a critical red flag. The absence of explicit capability checks and nonce verifications in the analyzed code, while not directly leading to detected vulnerabilities in this specific scan, could be contributing factors to past or potential future security weaknesses. Users should be aware that the plugin has a known security flaw that remains unpatched. While other aspects of the static analysis appear clean, this single, unaddressed CVE significantly elevates the risk profile of using this version of the plugin.

Key Concerns

  • Unpatched medium severity CVE (XSS)
  • Lack of demonstrated capability checks
  • Lack of demonstrated nonce checks
  • SQL query not using prepared statements
Vulnerabilities
1

Add Code To Head Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-48314medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Add Code To Head <= 1.17 - Authenticated (Administrator+) Stored Cross-Site Scripting

Aug 25, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Add Code To Head Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries
Attack Surface

Add Code To Head Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuadd-code-to-head.php:35
actionadmin_initadd-code-to-head.php:36
actionwp_headadd-code-to-head.php:37
Maintenance & Trust

Add Code To Head Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedMar 26, 2025
PHP min version
Downloads41K

Community Trust

Rating100/100
Number of ratings2
Active installs3K
Developer Profile

Add Code To Head Developer Profile

salubrio

2 plugins · 3K total installs

81
trust score
Avg Security Score
81/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Add Code To Head

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
plugin-options
FAQ

Frequently Asked Questions about Add Code To Head