Custom Highlight Color Security & Risk Analysis

wordpress.org/plugins/custom-highlight-color

Many devices and browsers provide less-than-ideal colors when selecting text on sites. Users may select text for a variety of reasons, including as a …

1K active installs v1.1 PHP + WP 4.5+ Updated Jul 12, 2024
colorcustom-colorhighlightselection
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Highlight Color Safe to Use in 2026?

Generally Safe

Score 92/100

Custom Highlight Color has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The 'custom-highlight-color' plugin version 1.1 exhibits a strong initial security posture based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code analysis reveals no dangerous functions, no file operations, no external HTTP requests, and importantly, all SQL queries utilize prepared statements, indicating good practices in database interaction. The lack of any recorded vulnerabilities in its history further supports a positive security outlook.

However, the analysis highlights a critical concern regarding output escaping. With one total output detected and 0% properly escaped, this presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that is not properly escaped can be exploited by attackers to inject malicious scripts. The absence of nonce and capability checks, while not immediately tied to a direct attack vector given the limited attack surface, represents a missed opportunity for robust authorization and could become a concern if the plugin's functionality were to expand in the future. The taint analysis showing zero flows with unsanitized paths is positive, but the unescaped output remains the most pressing and evidence-backed risk.

In conclusion, while the plugin has a clean vulnerability history and robust database practices, the unescaped output is a significant weakness that requires immediate attention. The lack of authorization checks is a secondary concern. Addressing the XSS risk through proper output sanitization should be the priority for improving the plugin's security.

Key Concerns

  • 0% properly escaped output
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Custom Highlight Color Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Custom Highlight Color Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Custom Highlight Color Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_headcustom-highlight-color.php:32
actioncustomize_registercustom-highlight-color.php:84
actioncustomize_preview_initcustom-highlight-color.php:96
Maintenance & Trust

Custom Highlight Color Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedJul 12, 2024
PHP min version
Downloads10K

Community Trust

Rating100/100
Number of ratings5
Active installs1K
Developer Profile

Custom Highlight Color Developer Profile

Nick Halsey

27 plugins · 24K total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
8 days
View full developer profile
Detection Fingerprints

How We Detect Custom Highlight Color

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-highlight-color/color-calculations.php
Script Paths
/wp-content/plugins/custom-highlight-color/customizer.js

HTML / DOM Fingerprints

Data Attributes
data-color
FAQ

Frequently Asked Questions about Custom Highlight Color