CSS Selectors Security & Risk Analysis

wordpress.org/plugins/css-selectors

It adds CSS selectors in the HTML where there are not.

0 active installs v0.0.3 PHP 5.6+ WP 4.6+ Updated Unknown
csscss-selectorsstyle
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CSS Selectors Safe to Use in 2026?

Generally Safe

Score 100/100

CSS Selectors has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "css-selectors" plugin v0.0.3 demonstrates an exceptionally strong security posture based on the provided static analysis and vulnerability history. The absence of any identified attack surface (AJAX handlers, REST API routes, shortcodes, cron events) significantly reduces the potential for external exploitation. Furthermore, the code exhibits excellent secure coding practices, with all SQL queries utilizing prepared statements and all identified output being properly escaped. The lack of file operations, external HTTP requests, and the absence of dangerous functions further bolster its security.

The plugin's vulnerability history is equally impressive, with zero recorded CVEs across all severities. This indicates a mature and well-maintained codebase, or a very limited history of exposure and development that has managed to avoid introducing common vulnerabilities. The complete absence of taint analysis findings with unsanitized paths reinforces the impression of a clean and secure codebase, devoid of critical or high-severity flaws.

In conclusion, the "css-selectors" plugin v0.0.3 appears to be remarkably secure. Its strengths lie in its minimal attack surface and diligent adherence to secure coding principles. While the complete lack of nonce checks and capability checks might be noted in a broader context, given the absence of any apparent entry points or sensitive operations, these are not immediate risks. The plugin's perfect record of no vulnerabilities further solidifies its high level of security.

Vulnerabilities
None known

CSS Selectors Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

CSS Selectors Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

CSS Selectors Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_noticescss-selectors.php:26
filterthe_contentcss-selectors.php:36
Maintenance & Trust

CSS Selectors Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version5.6
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

CSS Selectors Developer Profile

Jose Mortellaro

56 plugins · 26K total installs

87
trust score
Avg Security Score
99/100
Avg Patch Time
62 days
View full developer profile
Detection Fingerprints

How We Detect CSS Selectors

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
css-sel-*
FAQ

Frequently Asked Questions about CSS Selectors