Include Custom Files Security & Risk Analysis

wordpress.org/plugins/include-custom-files

Enables embedding of multiple stylesheets and javascript files on a per-post basis.

10 active installs v1.0 PHP + WP 2.9+ Updated May 12, 2010
cssembedjavascriptjs
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Include Custom Files Safe to Use in 2026?

Generally Safe

Score 85/100

Include Custom Files has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The 'include-custom-files' plugin version 1.0 presents a generally good security posture based on the provided static analysis. The absence of any identified dangerous functions, raw SQL queries, file operations, or external HTTP requests is a positive indicator. The presence of a nonce check is also a good practice. However, a significant concern arises from the 100% of output not being properly escaped. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious code could be injected and executed in a user's browser. The lack of capability checks on entry points, though the attack surface is currently zero, means that if new entry points were added without proper authentication, they would be vulnerable.

The vulnerability history shows no known CVEs, which is encouraging and suggests that the plugin has historically been secure or has not been a target for known exploits. This, combined with the absence of critical or high-severity taint flows, reinforces the impression of a plugin that has, so far, avoided major security pitfalls. Nevertheless, the unescaped output is a critical flaw that needs immediate attention. The plugin's strengths lie in its minimal attack surface and avoidance of common risky functions, but its weakness in output escaping poses a significant and readily exploitable threat.

Key Concerns

  • Unescaped output found
  • Missing capability checks on entry points
Vulnerabilities
None known

Include Custom Files Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Include Custom Files Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

Include Custom Files Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuinclude-custom-files.php:40
actionsave_postinclude-custom-files.php:43
actionwp_print_scriptsinclude-custom-files.php:46
actionwp_print_stylesinclude-custom-files.php:47
Maintenance & Trust

Include Custom Files Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedMay 12, 2010
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Include Custom Files Developer Profile

Utkarsh Kukreti

7 plugins · 130 total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Include Custom Files

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/include-custom-files/css//wp-content/plugins/include-custom-files/js/
Script Paths
get_bloginfo('template_url') . '/' . IncludeCustomFiles::$css_folder . '/

HTML / DOM Fingerprints

Data Attributes
name="custom_css"name="custom_js"
FAQ

Frequently Asked Questions about Include Custom Files