Awebsome! Browser Selector Security & Risk Analysis

wordpress.org/plugins/awebsome-browser-selector

Empower your CSS selectors! Write specific CSS code for each Platform/Browser/Version the right way.

100 active installs v2.2 PHP + WP 3.0+ Updated Nov 15, 2012
awebsomebrowsercssselectorspecific
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Awebsome! Browser Selector Safe to Use in 2026?

Generally Safe

Score 85/100

Awebsome! Browser Selector has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The static analysis of 'awebsome-browser-selector' v2.2 reveals an exceptionally clean codebase with no identified attack surface in terms of AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code demonstrates excellent security practices by avoiding dangerous functions, using prepared statements exclusively for SQL queries, and ensuring all output is properly escaped. There are no file operations or external HTTP requests, and crucially, no nonces or capability checks were detected, which is unusual for typical WordPress plugin interactions. The absence of any taint analysis findings further reinforces the impression of a secure code implementation. The plugin also has a perfect vulnerability history, with zero known CVEs of any severity, indicating a consistent track record of security. This plugin exhibits a strong security posture based on the provided static analysis and historical data, with no immediate exploitable vulnerabilities evident. The primary concern, though not explicitly a vulnerability, is the complete lack of any access control mechanisms like nonces or capability checks across its (albeit zero) entry points. While this might be acceptable if there are truly no user-facing or sensitive operations, it's a practice that warrants attention in the broader context of WordPress plugin development.

Key Concerns

  • No nonce checks detected
  • No capability checks detected
Vulnerabilities
None known

Awebsome! Browser Selector Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Awebsome! Browser Selector Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Awebsome! Browser Selector Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterbody_classawebsome-browser-selector.php:24
actionbp_includeawebsome-browser-selector.php:27
Maintenance & Trust

Awebsome! Browser Selector Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedNov 15, 2012
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Awebsome! Browser Selector Developer Profile

Raul Illana

4 plugins · 130 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Awebsome! Browser Selector

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/awebsome-browser-selector/awebsome-browser-selector.js/wp-content/plugins/awebsome-browser-selector/css/awebsome-browser-selector.css
Script Paths
/wp-content/plugins/awebsome-browser-selector/awebsome-browser-selector.js
Version Parameters
awebsome-browser-selector/css/awebsome-browser-selector.css?ver=awebsome-browser-selector/awebsome-browser-selector.js?ver=

HTML / DOM Fingerprints

CSS Classes
winlnxmaccrosandroidiphoneipadwinphone+17 more
FAQ

Frequently Asked Questions about Awebsome! Browser Selector