Browser Specific CSS Security & Risk Analysis

wordpress.org/plugins/browser-specific-css

The Browser Specific CSS Plugin allows you to easily target specific browsers and operating systems from your theme's stylesheet using regular cs …

100 active installs v0.3 PHP + WP 2.0.2+ Updated Nov 2, 2013
browsercssie6ie7target
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Browser Specific CSS Safe to Use in 2026?

Generally Safe

Score 85/100

Browser Specific CSS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "browser-specific-css" plugin v0.3 exhibits a generally positive security posture based on the provided static analysis. The absence of identified dangerous functions, raw SQL queries, file operations, and external HTTP requests, coupled with the use of prepared statements for all SQL queries, indicates good development practices in these critical areas. The presence of a nonce check is also a positive sign for securing potential entry points, although the lack of capability checks on any potential entry points is a concern.

However, the analysis reveals a significant weakness in output escaping, with 100% of the four identified outputs not being properly escaped. This could potentially lead to cross-site scripting (XSS) vulnerabilities if user-supplied data or dynamic content is rendered directly without sanitization. The lack of any identified taint flows or known vulnerabilities in its history is encouraging, suggesting a relatively clean codebase in terms of complex vulnerabilities. Nevertheless, the unescaped output remains a tangible risk that needs to be addressed.

In conclusion, while the plugin demonstrates strengths in data handling and lacks a history of vulnerabilities, the critical flaw in output escaping presents a clear and present danger. The limited attack surface and absence of known exploits are positive indicators, but the unescaped output is a substantial security concern that could be exploited by attackers. Therefore, a cautious approach is warranted until this output escaping issue is resolved.

Key Concerns

  • 0% output escaping
  • No capability checks on entry points
Vulnerabilities
None known

Browser Specific CSS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Browser Specific CSS Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

Browser Specific CSS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuwp_browser_specific_css.php:93
actionwp_headwp_browser_specific_css.php:94
actionwp_headwp_browser_specific_css.php:95
Maintenance & Trust

Browser Specific CSS Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedNov 2, 2013
PHP min version
Downloads9K

Community Trust

Rating100/100
Number of ratings4
Active installs100
Developer Profile

Browser Specific CSS Developer Profile

Adrian Hanft

5 plugins · 210 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Browser Specific CSS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/browser-specific-css/css_browser_selector.js
Script Paths
/wp-content/plugins/browser-specific-css/css_browser_selector.js

HTML / DOM Fingerprints

HTML Comments
<!-- Browser Specific CSS -->
FAQ

Frequently Asked Questions about Browser Specific CSS