External CSS Security & Risk Analysis

wordpress.org/plugins/external-css

Allows you to edit an external CSS file through WordPress dashboard.

10 active installs v0.2.3 PHP + WP 2.7.0+ Updated Dec 24, 2020
cssseo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is External CSS Safe to Use in 2026?

Generally Safe

Score 85/100

External CSS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "external-css" v0.2.3 plugin exhibits a mixed security posture. On the positive side, it has a very small attack surface with no detected AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, no known vulnerabilities in its history. The plugin also demonstrates good practice by exclusively using prepared statements for its SQL queries, which significantly mitigates SQL injection risks. However, there are notable concerns regarding output sanitization and file operations.

The static analysis reveals that 100% of output operations are not properly escaped, presenting a significant risk of cross-site scripting (XSS) vulnerabilities. The presence of 10 file operations without further context is also a potential concern, especially if these operations are not secured against directory traversal or other file manipulation attacks. The taint analysis shows two flows with unsanitized paths, which, while not classified as critical or high, directly correlates with the output escaping issue and indicates potential pathways for malicious input to be processed without proper validation.

Given the absence of any recorded vulnerabilities in its history, the plugin appears to have been developed with some security awareness. However, the lack of output escaping is a serious oversight that could be easily exploited. The small attack surface is a strength, but it does not negate the risks introduced by the unescaped output and potentially insecure file operations. Therefore, while the plugin is not actively known to be vulnerable, immediate attention should be paid to its output sanitization and file handling.

Key Concerns

  • 0% of output properly escaped
  • 2 flows with unsanitized paths
  • 10 file operations without further context
  • 0 capability checks on entry points
  • 0 nonce checks on entry points
Vulnerabilities
None known

External CSS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

External CSS Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
10
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
external_css_theme_page (external-css.php:116)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

External CSS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuexternal-css.php:169
actioninitexternal-css.php:172
actionwp_enqueue_scriptsexternal-css.php:173
Maintenance & Trust

External CSS Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedDec 24, 2020
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

External CSS Developer Profile

sakuratan

2 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect External CSS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/external-css/css/custom.css

HTML / DOM Fingerprints

CSS Classes
error
HTML Comments
<!-- Edit this -->
FAQ

Frequently Asked Questions about External CSS