GravityWP – CSS Selector Security & Risk Analysis

wordpress.org/plugins/gravitywp-css-selector

Easily select CSS Ready Classes for your fields within Gravity Forms

4K active installs v1.1 PHP + WP 3.0.1+ Updated Apr 16, 2025
css-ready-classesformformsgravity-formgravity-forms
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GravityWP – CSS Selector Safe to Use in 2026?

Generally Safe

Score 100/100

GravityWP – CSS Selector has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11mo ago
Risk Assessment

The "gravitywp-css-selector" v1.1 plugin exhibits a strong security posture in several key areas. The absence of known CVEs and a clean vulnerability history are positive indicators. Furthermore, the static analysis reveals no identified dangerous functions, no file operations, and no external HTTP requests, all of which reduce the attack surface. The fact that all SQL queries utilize prepared statements is an excellent practice, mitigating SQL injection risks. Taint analysis also shows no critical or high-severity unsanitized flows, which is a significant strength.

However, there is a notable concern regarding output escaping. With 100% of the analyzed outputs not being properly escaped, this presents a potential risk of Cross-Site Scripting (XSS) vulnerabilities. If user-supplied data is displayed without proper sanitization or escaping, an attacker could inject malicious scripts into the website. The complete lack of capability checks and nonce checks, while not directly indicative of a vulnerability in the current analysis (due to zero entry points), suggests a potential weakness if new entry points were to be added in future versions without these security measures. Overall, the plugin is well-defended against common threats like SQL injection and has a clean history, but the unescaped output is a critical area requiring attention.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

GravityWP – CSS Selector Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

GravityWP – CSS Selector Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

GravityWP – CSS Selector Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actiongform_editor_jsgravitywp-css-selector.php:18
actionplugins_loadedgravitywp-css-selector.php:259
Maintenance & Trust

GravityWP – CSS Selector Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 16, 2025
PHP min version
Downloads54K

Community Trust

Rating100/100
Number of ratings9
Active installs4K
Developer Profile

GravityWP – CSS Selector Developer Profile

GravityWP

4 plugins · 9K total installs

99
trust score
Avg Security Score
99/100
Avg Patch Time
4 days
View full developer profile
Detection Fingerprints

How We Detect GravityWP – CSS Selector

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
gwp_css_accordiangwp_css_acc_linkgwp_css_linkgwp_css_link_docgwp_css_ulgwp_title
Data Attributes
rel='gf_left_half'rel='gf_right_half'rel='gf_left_third'rel='gf_middle_third'rel='gf_right_third'rel='gf_first_quarter'+17 more
FAQ

Frequently Asked Questions about GravityWP – CSS Selector