Custom Preloader Security & Risk Analysis

wordpress.org/plugins/custom-preloader

This Plugin it more for the Beauty of your Website! It's hiding your front page until your objects set in their positions! Custom Preloader has A …

90 active installs v2.0 PHP + WP 4.x+ Updated Feb 8, 2018
customimageimage-loaderimage-preloaderpreloader
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Preloader Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Preloader has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "custom-preloader" v2.0 plugin exhibits a mixed security posture. On the positive side, there are no reported vulnerabilities in its history, no known CVEs, and the static analysis shows no dangerous functions, no raw SQL queries, no file operations, and no external HTTP requests. The absence of a large attack surface with numerous entry points is also a positive indicator.

However, a significant concern arises from the output escaping. With 100% of its 51 outputs not being properly escaped, this plugin presents a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is processed and then displayed by the plugin without proper sanitization or escaping is a potential vector for malicious script injection. The lack of nonce checks and the single capability check, while not inherently bad, do not mitigate the XSS risk. The taint analysis showing zero flows is likely a consequence of the limited entry points, but it does not negate the risk posed by unescaped output.

In conclusion, while the plugin has a clean vulnerability history and a seemingly small attack surface, the complete lack of output escaping is a critical flaw that overshadows its strengths. Users of this plugin should be aware of the substantial XSS risk. The absence of any recorded vulnerabilities in the past is good, but it does not guarantee future security, especially with such a fundamental security practice neglected.

Key Concerns

  • All output is unescaped, high XSS risk
Vulnerabilities
None known

Custom Preloader Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Preloader Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
51
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped51 total outputs
Attack Surface

Custom Preloader Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionwp_enqueue_scriptsinclude\frontend.php:7
actionwp_headinclude\frontend.php:91
actionwp_footerinclude\frontend.php:124
actionwp_headinclude\frontend.php:145
actionadmin_enqueue_scriptsinclude\functions.php:377
actionadmin_initpreloader.php:120
actionadmin_menupreloader.php:126
Maintenance & Trust

Custom Preloader Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedFeb 8, 2018
PHP min version
Downloads15K

Community Trust

Rating74/100
Number of ratings7
Active installs90
Developer Profile

Custom Preloader Developer Profile

NikosTsolakos

2 plugins · 190 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Preloader

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-preloader/css/style.css

HTML / DOM Fingerprints

CSS Classes
custom_preloader
Data Attributes
id="custom_preloader"
FAQ

Frequently Asked Questions about Custom Preloader