CC-Scripts Security & Risk Analysis

wordpress.org/plugins/cc-scripts

Add custom JavaScript code to all your WordPress pages at once via the Admin panel.

10 active installs v1.2.0 PHP 7.0+ WP 4.6+ Updated Feb 28, 2018
bodyfooterheadjavascriptscripts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CC-Scripts Safe to Use in 2026?

Generally Safe

Score 85/100

CC-Scripts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The cc-scripts v1.2.0 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of known vulnerabilities and CVEs, coupled with the lack of identified dangerous functions, raw SQL queries, file operations, and external HTTP requests, suggests a well-maintained and secure codebase. The total absence of an attack surface through AJAX, REST API, shortcodes, and cron events is a significant strength, indicating that the plugin does not introduce common entry points for attackers. Furthermore, the complete lack of taint analysis findings reinforces the perception of a secure implementation.

However, there are areas for improvement. The most notable concern is the low percentage of properly escaped output (14%). This could potentially lead to Cross-Site Scripting (XSS) vulnerabilities if untrusted data is rendered directly to the user's browser without sufficient sanitization. While the taint analysis did not flag any specific issues, this could be due to the limited scope of the analysis or the absence of certain types of data flows. The lack of nonce checks and capability checks, although not directly exploitable given the zero attack surface, represents a missed opportunity to implement robust authorization and protection against CSRF attacks should any entry points be added in future versions. Overall, the plugin is currently very secure due to its minimal attack surface and lack of known issues, but the output escaping deficiency warrants attention.

Key Concerns

  • Low output escaping percentage
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

CC-Scripts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

CC-Scripts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
25
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

14% escaped29 total outputs
Attack Surface

CC-Scripts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionactivated_pluginincludes\class-plugin.php:67
actiondeactivated_pluginincludes\class-plugin.php:68
Maintenance & Trust

CC-Scripts Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedFeb 28, 2018
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

CC-Scripts Developer Profile

Clearcode

16 plugins · 220 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CC-Scripts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cc-scripts/assets/css/style.css/wp-content/plugins/cc-scripts/assets/js/script.js
Version Parameters
cc-scripts/assets/css/style.css?ver=cc-scripts/assets/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
head_method
Data Attributes
id="scripts"name="cc-scripts[head][scripts]"name="cc-scripts[head][dependencies]"name="cc-scripts[head][method]"name="cc-scripts[body][scripts]"name="cc-scripts[body][dependencies]"+4 more
FAQ

Frequently Asked Questions about CC-Scripts