Custom PHP Settings Security & Risk Analysis

wordpress.org/plugins/custom-php-settings

This plugin makes it possible to override php settings.

10K active installs v2.4.1 PHP 5.6+ WP 4.1.0+ Updated Nov 20, 2025
apacheapache2htaccessphpsettings
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom PHP Settings Safe to Use in 2026?

Generally Safe

Score 100/100

Custom PHP Settings has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The "custom-php-settings" v2.4.1 plugin exhibits a generally positive security posture with a small attack surface and no known past vulnerabilities. The plugin correctly utilizes prepared statements for SQL queries and incorporates both nonce and capability checks for its identified entry points, which is commendable. However, the presence of the `unserialize` function is a significant concern. Although no taint flows were detected in the static analysis, the `unserialize` function is inherently dangerous as it can lead to arbitrary object injection if processing untrusted input. The limited output escaping (only 20% properly escaped) further exacerbates this risk, as it could allow for cross-site scripting (XSS) vulnerabilities if serialized data is directly reflected in the output without proper sanitization.

While the plugin's vulnerability history is clean and it has no known CVEs, this does not negate the risks identified in the code. The lack of taint flow detection in this analysis might be due to the limited scope of the static analysis or the specific way the `unserialize` function is used. The use of an outdated bundled library (Freemius v1.0) also presents a potential, albeit minor, risk, as older library versions may contain undiscovered vulnerabilities. Overall, the plugin has strengths in authentication and SQL handling, but the risky use of `unserialize` and poor output escaping necessitate careful review and mitigation.

Key Concerns

  • Use of dangerous unserialize function
  • Low percentage of properly escaped output
  • Bundled outdated Freemius library
Vulnerabilities
None known

Custom PHP Settings Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom PHP Settings Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
64
16 escaped
Nonce Checks
2
Capability Checks
2
File Operations
5
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

unserialize$this->settings = unserialize($content);src\Plugin\Settings\Settings.php:330

Bundled Libraries

Freemius1.0

Output Escaping

20% escaped80 total outputs
Attack Surface

Custom PHP Settings Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_custom_php_settings_dismiss_noticesrc\Backend\Backend.php:116
WordPress Hooks 10
actionafter_setup_themebootstrap.php:55
actioninitsrc\Backend\Backend.php:110
actionadmin_menusrc\Backend\Backend.php:111
actionin_admin_headersrc\Backend\Backend.php:112
actionadmin_post_custom_php_settings_save_settingssrc\Backend\Backend.php:113
actionadmin_enqueue_scriptssrc\Backend\Backend.php:114
actioncustom_php_settings_admin_noticessrc\Backend\Backend.php:115
filteradmin_footer_textsrc\Backend\Backend.php:123
filterplugin_action_linkssrc\Backend\Backend.php:124
filterplugin_row_metasrc\Backend\Backend.php:130
Maintenance & Trust

Custom PHP Settings Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedNov 20, 2025
PHP min version5.6
Downloads408K

Community Trust

Rating88/100
Number of ratings15
Active installs10K
Developer Profile

Custom PHP Settings Developer Profile

cyclonecode

4 plugins · 10K total installs

97
trust score
Avg Security Score
96/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect Custom PHP Settings

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-php-settings/src/Backend/assets/js/custom-php-settings.js/wp-content/plugins/custom-php-settings/src/Backend/assets/css/custom-php-settings.css
Script Paths
/wp-content/plugins/custom-php-settings/src/Backend/assets/js/custom-php-settings.js
Version Parameters
custom-php-settings/src/Backend/assets/js/custom-php-settings.js?ver=custom-php-settings/src/Backend/assets/css/custom-php-settings.css?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- CUSTOM PHP SETTINGS -->
Data Attributes
data-cps-dismissible-notice
JS Globals
custom_php_settings_admin_ajax_objectcustom_php_settings_vars
FAQ

Frequently Asked Questions about Custom PHP Settings