Custom Resources Security & Risk Analysis

wordpress.org/plugins/custom-resources

Easily load additional styles and scripts (for both front and backend pages). Works by direct inline embedding or by using URL's.

10 active installs v1.0.7 PHP + WP 3.0.1+ Updated Unknown
customembedinlinescriptsstyles
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Resources Safe to Use in 2026?

Generally Safe

Score 100/100

Custom Resources has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "custom-resources" plugin v1.0.7 exhibits a strong adherence to secure coding practices in several key areas. The static analysis reveals no identified attack surface points, meaning there are no accessible AJAX handlers, REST API routes, shortcodes, or cron events that could be exploited. Furthermore, the plugin successfully avoids dangerous functions, performs all SQL queries using prepared statements, and has no recorded file operations or external HTTP requests. This indicates a well-contained and defensively programmed plugin.

However, a significant concern arises from the complete lack of output escaping. With 13 outputs analyzed and 0% properly escaped, this opens the plugin to potential Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is displayed on the frontend without proper sanitization could be manipulated to inject malicious scripts. Additionally, the absence of nonce and capability checks, while potentially justifiable if the plugin has no user-facing features that require protection, still represents a missed opportunity for robust security if any user interaction were to be added in the future. The vulnerability history being clean is positive, but does not mitigate the identified output escaping risks.

In conclusion, while the "custom-resources" plugin demonstrates excellent security hygiene in its core functionalities by avoiding common pitfalls like raw SQL and external requests, the unescaped output is a critical oversight that severely undermines its overall security posture. The lack of checks for nonces and capabilities also presents a potential weakness depending on future development. It is highly recommended to address the output escaping immediately to prevent XSS attacks.

Key Concerns

  • Output not properly escaped
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Custom Resources Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Resources Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
13
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped13 total outputs
Attack Surface

Custom Resources Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_enqueue_scriptscontroller.php:68
actionadmin_menucontroller.php:69
actionadmin_initcontroller.php:70
actionadmin_headcontroller.php:71
actionwp_headcontroller.php:74
Maintenance & Trust

Custom Resources Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Custom Resources Developer Profile

Fineswap

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Resources

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-resources/style.css
Version Parameters
custom-resources/style.css?ver=

HTML / DOM Fingerprints

HTML Comments
<!--/*--><![CDATA[/*><!--*//*]]>*/-->
Data Attributes
page="custom_resources"
FAQ

Frequently Asked Questions about Custom Resources