Color Scheme every Theme Security & Risk Analysis

wordpress.org/plugins/color-scheme-every-theme

This plugin lets you change the entire color scheme of the current theme via the

50 active installs v2.1 PHP + WP 3.4+ Updated Mar 24, 2013
color-schemecsscustomizationcustomizerthemes
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Color Scheme every Theme Safe to Use in 2026?

Generally Safe

Score 85/100

Color Scheme every Theme has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "color-scheme-every-theme" plugin v2.1 exhibits a generally positive security posture based on the provided static analysis. The plugin has a remarkably small attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events directly exposed. Furthermore, the absence of dangerous functions and external HTTP requests is commendable. The use of prepared statements for all SQL queries is a significant strength, preventing common SQL injection vulnerabilities.

However, a critical concern arises from the complete lack of output escaping (0% properly escaped). With 28 total outputs, this represents a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is outputted by the plugin without proper sanitization could be exploited. While taint analysis did not reveal any critical or high severity flows, the lack of escaping means that even low-severity user input could lead to XSS.

The plugin's vulnerability history is clean, with no recorded CVEs, which is reassuring. This, combined with the lack of critical taint flows, suggests the developers have been diligent in the past. Nevertheless, the severe lack of output escaping is a glaring weakness that overshadows the other strengths and requires immediate attention.

Key Concerns

  • All outputs are unescaped (XSS risk)
  • Capability check present, but nonce checks missing
Vulnerabilities
None known

Color Scheme every Theme Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Color Scheme every Theme Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
28
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
4
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped28 total outputs
Attack Surface

Color Scheme every Theme Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actioncustomize_registerclasses\Cset.class.php:20
actionwp_headclasses\Cset.class.php:21
actionadmin_menuclasses\Options.class.php:31
actionadmin_initclasses\Options.class.php:32
filterplugin_action_links_color-scheme-every-theme/color-scheme-every-theme.phpclasses\Options.class.php:42
actionadmin_enqueue_scriptsclasses\Options.class.php:44
actioncustomize_registerclasses\WP_Customize_Color_Scheme_Control.php:5
Maintenance & Trust

Color Scheme every Theme Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedMar 24, 2013
PHP min version
Downloads15K

Community Trust

Rating64/100
Number of ratings6
Active installs50
Developer Profile

Color Scheme every Theme Developer Profile

danielauener

4 plugins · 160 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Color Scheme every Theme

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/color-scheme-every-theme/views/css/options.css/wp-content/plugins/color-scheme-every-theme/views/js/options.js
Script Paths
/wp-content/plugins/color-scheme-every-theme/views/js/options.js
Version Parameters
color-scheme-every-theme/color-scheme-every-theme.php?ver=

HTML / DOM Fingerprints

CSS Classes
cset_color_schemes
Data Attributes
data-scheme-name
JS Globals
cset_schemes
FAQ

Frequently Asked Questions about Color Scheme every Theme