CSS File Selector Security & Risk Analysis

wordpress.org/plugins/css-file-selector

Select files CSS and/or write CSS rules to any single page or post

30 active installs v1.0.4 PHP + WP 3.0+ Updated Jan 7, 2015
csscustom-cssfile-csspagepost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CSS File Selector Safe to Use in 2026?

Generally Safe

Score 85/100

CSS File Selector has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'css-file-selector' plugin, version 1.0.4, exhibits a generally strong security posture based on the provided static analysis. The plugin has no known vulnerabilities (CVEs) recorded, indicating a history of secure development or diligent patching. The absence of detected dangerous functions, external HTTP requests, and file operations further bolsters its security. The use of prepared statements for all SQL queries and the presence of nonce and capability checks are positive indicators of secure coding practices. However, the limited output escaping (33% properly escaped) presents a potential concern for cross-site scripting (XSS) vulnerabilities if sensitive data is outputted without sufficient sanitization. While the attack surface is currently zero, this could change with future updates.

Key Concerns

  • Low output escaping coverage
Vulnerabilities
None known

CSS File Selector Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

CSS File Selector Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
1 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped3 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<cssfileselector> (cssfileselector.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

CSS File Selector Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadd_meta_boxescssfileselector.php:181
actionadmin_initcssfileselector.php:183
actionsave_postcssfileselector.php:185
actionadmin_enqueue_scriptscssfileselector.php:187
actionwp_enqueue_scriptscssfileselector.php:189
actionwp_headcssfileselector.php:191
actiondelete_postcssfileselector.php:193
Maintenance & Trust

CSS File Selector Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedJan 7, 2015
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings3
Active installs30
Developer Profile

CSS File Selector Developer Profile

Chrgiga

2 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CSS File Selector

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/css-file-selector/inc/css/cssfileselector.css/wp-content/plugins/css-file-selector/inc/js/cssfileselector.js
Script Paths
/wp-content/plugins/css-file-selector/inc/js/cssfileselector.js
Version Parameters
cssfileselector.js?ver=1.0.0

HTML / DOM Fingerprints

CSS Classes
add-select-css
HTML Comments
<!-- CSS File Selector (custom rules) -->
Data Attributes
name="gil_css_file_selector_file[]"name="gil_css_file_selector_rules"id="css-file-selector-rules"name="gil_css_file_selector_chrgiga"
FAQ

Frequently Asked Questions about CSS File Selector