In Page Script Security & Risk Analysis

wordpress.org/plugins/in-page-script

This plugin helps to add scripts into the header (before close tag </HEAD>) or the footer (before close tag </BODY>).

100 active installs v0.1 PHP + WP 3.0.1+ Updated Sep 7, 2015
adwords-scriptfooter-scriptgoogle-analytics-scriptheader-script
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is In Page Script Safe to Use in 2026?

Generally Safe

Score 85/100

In Page Script has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "in-page-script" v0.1 plugin exhibits a generally positive security posture due to its limited attack surface and absence of known vulnerabilities. The static analysis indicates no direct entry points like AJAX handlers, REST API routes, or shortcodes that are exposed without authentication. Furthermore, the code does not appear to perform dangerous functions, file operations, or external HTTP requests, which are common sources of security flaws. The presence of nonce and capability checks, although minimal in number, suggests an awareness of secure coding practices.

However, a significant concern is the complete lack of proper output escaping. With 18 total outputs analyzed, none are properly escaped, which presents a high risk of Cross-Site Scripting (XSS) vulnerabilities. This means that any user-supplied data displayed by the plugin could potentially be executed as malicious JavaScript in the browser of other users. While taint analysis did not reveal any unsanitized paths, the lack of output escaping can still lead to exploitable XSS in conjunction with other data sources.

The plugin's vulnerability history is clean, with no recorded CVEs. This, combined with the limited attack surface, is a positive indicator. However, the critical flaw in output escaping overshadows these strengths. The plugin needs immediate attention to address the XSS risk. While its current version has no known exploits, the unescaped output is a pre-existing vulnerability that attackers could leverage if they discover it.

Key Concerns

  • 0% properly escaped output detected
Vulnerabilities
None known

In Page Script Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

In Page Script Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
18
0 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped18 total outputs
Attack Surface

In Page Script Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actioninitin-page-script.php:36
actionadmin_initin-page-script.php:39
actionadd_meta_boxesin-page-script.php:40
actionsave_postin-page-script.php:41
actionadmin_menuin-page-script.php:42
actionwp_headin-page-script.php:44
actionwp_footerin-page-script.php:45
Maintenance & Trust

In Page Script Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedSep 7, 2015
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

In Page Script Developer Profile

Phuc Pham

3 plugins · 120 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect In Page Script

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="ips[header_script]"name="ips[footer_script]"
FAQ

Frequently Asked Questions about In Page Script