Custom Code Security & Risk Analysis

wordpress.org/plugins/custom-code

Add Custom script and CSS code to header, footer,before post and after post.

100 active installs v1.1 PHP + WP 3.0.1+ Updated Mar 2, 2014
csscustom-codefooterheaderscript
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Code Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Code has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The 'custom-code' plugin v1.1 exhibits a generally strong security posture based on the provided static analysis. The plugin has zero identified CVEs and no history of past vulnerabilities, which is a very positive sign. The absence of a significant attack surface through AJAX, REST API, shortcodes, and cron events, combined with the presence of nonce and capability checks, suggests a cautious approach to development. Furthermore, all SQL queries are reported as using prepared statements, which is a critical best practice for preventing SQL injection vulnerabilities.

However, a significant concern arises from the output escaping. With 3 total outputs and 0% properly escaped, this indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data output by this plugin to the browser, if not properly sanitized, could be exploited by an attacker to inject malicious scripts. While the taint analysis shows no specific unsanitized flows, the lack of output escaping across the board means that such flows could easily exist and be triggered. The plugin's strengths lie in its limited attack surface and secure database interactions, but the unescaped output is a glaring weakness that requires immediate attention.

Key Concerns

  • 0% output escaping
Vulnerabilities
None known

Custom Code Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Code Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Custom Code Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionadmin_initcustom-code.php:14
actioninitcustom-code.php:33
actionadd_meta_boxescustom-code.php:62
actionsave_postcustom-code.php:124
actionwp_headcustom-code.php:126
actionwp_footercustom-code.php:132
filterthe_contentcustom-code.php:134
filterpost_row_actionscustom-code.php:226
actionadmin_initcustom-code.php:229
Maintenance & Trust

Custom Code Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedMar 2, 2014
PHP min version
Downloads8K

Community Trust

Rating80/100
Number of ratings4
Active installs100
Developer Profile

Custom Code Developer Profile

Bhagirath Dhanani

4 plugins · 390 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Code

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- Custom Code Start-->
Data Attributes
name="_code_position"name="_custom_code"id="custom_code_noncename"
FAQ

Frequently Asked Questions about Custom Code