Custom Content Width Security & Risk Analysis

wordpress.org/plugins/custom-content-width

Adds a 'Custom Content Width' setting to the Settings > Media screen, to let users override their theme's content width.

1K active installs v1.0.1 PHP + WP 2.7+ Updated Feb 4, 2015
content-widththeme
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Content Width Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Content Width has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The custom-content-width plugin v1.0.1 exhibits a generally strong security posture based on the provided static analysis. The absence of any identified dangerous functions, external HTTP requests, file operations, and the exclusive use of prepared statements for SQL queries are all positive indicators. Furthermore, the complete output escaping and lack of critical or high severity taint flows suggest a well-written and secure codebase in these areas. The plugin also has no recorded vulnerability history, which further reinforces its current security standing.

However, a significant concern arises from the complete lack of nonces and capability checks across all entry points. While the static analysis reports zero entry points, this absence of essential security mechanisms means that if any new entry points were introduced or if existing ones were overlooked in the analysis, they would be completely unprotected against common web vulnerabilities like Cross-Site Request Forgery (CSRF) or unauthorized access. The plugin's small attack surface (zero reported entry points) mitigates this immediate risk, but it represents a significant gap in security best practices that could become a problem if the plugin evolves or its usage changes.

In conclusion, the plugin is currently very secure due to its minimal functionality and robust coding practices in specific areas like SQL and output handling. The lack of any known vulnerabilities is a major strength. The primary weakness is the complete absence of nonces and capability checks, which, while not directly exploitable in the current analysis, points to a potential future risk if the plugin's attack surface expands. This should be addressed to ensure long-term security.

Key Concerns

  • Missing nonce checks on all entry points
  • Missing capability checks on all entry points
Vulnerabilities
None known

Custom Content Width Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Content Width Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped3 total outputs
Attack Surface

Custom Content Width Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitcustom-content-width.php:16
actionadmin_initcustom-content-width.php:17
Maintenance & Trust

Custom Content Width Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedFeb 4, 2015
PHP min version
Downloads27K

Community Trust

Rating96/100
Number of ratings8
Active installs1K
Developer Profile

Custom Content Width Developer Profile

George Stephanis

16 plugins · 16K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Content Width

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
small-text
Data Attributes
id="custom_content_width"name="custom_content_width"
JS Globals
jQuery
FAQ

Frequently Asked Questions about Custom Content Width