Custom CSS Injector Security & Risk Analysis

wordpress.org/plugins/css-injector

Fast & simple solution to control custom CSS code in selected areas of Your website. Works to 8 times faster than most popular CSS plugin.

40 active installs v1.0.1 PHP + WP 3.1+ Updated Sep 3, 2017
admin-csscsscustomcustom-cssstyle
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom CSS Injector Safe to Use in 2026?

Generally Safe

Score 85/100

Custom CSS Injector has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "css-injector" plugin version 1.0.1 exhibits a concerning security posture despite a lack of known vulnerabilities or a large attack surface. While there are no identified AJAX handlers, REST API routes, shortcodes, or cron events, and no dangerous functions or direct SQL queries are present, the code analysis reveals significant weaknesses. A critical finding is that 100% of the 40 output operations are not properly escaped, presenting a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, all 10 analyzed taint flows indicate unsanitized paths, suggesting that user-controlled input could potentially lead to unintended code execution or data manipulation, even if direct exploitation vectors are not immediately apparent from the provided attack surface data. The absence of any recorded vulnerabilities in its history could be misleading, as the identified code quality issues strongly suggest a high potential for undiscovered flaws.

Given the complete lack of output escaping and the widespread unsanitized taint flows, the "css-injector" plugin, despite its small attack surface and clean vulnerability history, poses a significant risk to WordPress sites. The absence of proper security measures like output escaping and sanitization for data flows leaves it vulnerable to XSS attacks and potentially other injection-based vulnerabilities if input sources are not strictly controlled. While the plugin has not historically had reported issues, this often means it hasn't been rigorously tested or targeted. The identified coding practices are a strong indicator of a high likelihood of future vulnerabilities. Therefore, immediate attention to addressing these unescaped outputs and unsanitized data flows is crucial for mitigating potential security risks.

Key Concerns

  • No output properly escaped
  • All analyzed taint flows unsanitized
  • No capability checks
  • No nonce checks
Vulnerabilities
None known

Custom CSS Injector Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom CSS Injector Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
40
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped40 total outputs
Data Flows
10 unsanitized

Data Flow Analysis

10 flows10 with unsanitized paths
Refresh (_core\1.0.0L\classes\Redirects.class.php:76)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Custom CSS Injector Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actioninitindex.php:46
actionadmin_menu_core\1.0.0L\classes\Plugin.class.php:245
actionadmin_menu_core\1.0.0L\classes\Plugin.class.php:286
actionadmin_head_core\1.0.0L\classes\Plugin.class.php:308
actionadmin_menu_core\1.0.0L\classes\Plugin.class.php:320
filtersubmenu_file_core\1.0.0L\classes\Plugin.class.php:373
actionadmin_menu_core\1.0.0L\classes\Plugin.class.php:390
Maintenance & Trust

Custom CSS Injector Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedSep 3, 2017
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs40
Developer Profile

Custom CSS Injector Developer Profile

77 Solutions

2 plugins · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom CSS Injector

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/css-injector/css-injector.css/wp-content/plugins/css-injector/css-injector.js
Script Paths
/wp-content/plugins/css-injector/css-injector.js
Version Parameters
css-injector/css-injector.css?ver=css-injector/css-injector.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- CSS Injector --><!-- CSS Injector Admin -->
Data Attributes
data-csi-iddata-csi-edit
JS Globals
window.csi_data
FAQ

Frequently Asked Questions about Custom CSS Injector