JS Injector Security & Risk Analysis

wordpress.org/plugins/js-injector

Super simple solution to add, edit and control custom JS code in selected area of Your WordPress website. Check long description.

20 active installs v1.0.0 PHP + WP 3.1+ Updated Sep 5, 2017
admin-jscustomcustom-jsjsstyle
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is JS Injector Safe to Use in 2026?

Generally Safe

Score 85/100

JS Injector has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The js-injector v1.0.0 plugin presents a mixed security posture. On the positive side, it exhibits no known vulnerabilities in its history and uses prepared statements for all SQL queries, which is a strong defense against SQL injection. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its direct attack surface and potential for direct unauthenticated exploitation.

However, the static analysis reveals significant concerns regarding output escaping. With 40 total outputs and 0% properly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data that is outputted by this plugin without proper sanitization or escaping could be manipulated by an attacker to inject malicious scripts into the user's browser. Furthermore, the taint analysis indicating 10 flows with unsanitized paths, despite no critical or high severity classifications in this specific run, is a warning sign that potentially sensitive data might not be handled securely. The presence of file operations also warrants careful review depending on their nature and how they interact with user-supplied data.

While the vulnerability history is clean, this does not guarantee future security, especially given the identified weaknesses in output handling. The plugin's strengths lie in its limited attack surface and secure SQL practices. Its primary weakness is the prevalent lack of output escaping, which could lead to XSS vulnerabilities. A balanced conclusion is that while the plugin avoids common pitfalls like unpatched CVEs and insecure SQL, the unescaped output is a critical flaw that requires immediate attention. The taint analysis further reinforces the need for thorough code review of how data is processed and displayed.

Key Concerns

  • 0% properly escaped output
  • 10 flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

JS Injector Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

JS Injector Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
40
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped40 total outputs
Data Flows
10 unsanitized

Data Flow Analysis

10 flows10 with unsanitized paths
Refresh (_core\1.0.0L\classes\Redirects.class.php:76)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

JS Injector Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actioninitindex.php:46
actionadmin_menu_core\1.0.0L\classes\Plugin.class.php:245
actionadmin_menu_core\1.0.0L\classes\Plugin.class.php:286
actionadmin_head_core\1.0.0L\classes\Plugin.class.php:308
actionadmin_menu_core\1.0.0L\classes\Plugin.class.php:320
filtersubmenu_file_core\1.0.0L\classes\Plugin.class.php:373
actionadmin_menu_core\1.0.0L\classes\Plugin.class.php:390
Maintenance & Trust

JS Injector Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedSep 5, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

JS Injector Developer Profile

77 Solutions

2 plugins · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect JS Injector

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/js-injector/_core/1.0.0L/js/77-scripts.js/wp-content/plugins/js-injector/_core/1.0.0L/js/77-styles.js/wp-content/plugins/js-injector/assets/css/dashboard.css/wp-content/plugins/js-injector/assets/js/dashboard.js
Script Paths
/wp-content/plugins/js-injector/_core/1.0.0L/js/77-scripts.js/wp-content/plugins/js-injector/_core/1.0.0L/js/77-styles.js/wp-content/plugins/js-injector/assets/js/dashboard.js
Version Parameters
js-injector/_core/1.0.0L/js/77-scripts.js?ver=js-injector/_core/1.0.0L/js/77-styles.js?ver=js-injector/assets/css/dashboard.css?ver=js-injector/assets/js/dashboard.js?ver=

HTML / DOM Fingerprints

CSS Classes
js-injector-dashboard-form
HTML Comments
JS Injector - DashboardThis file is part of JS Injector.JS Injector is free software: you can redistribute it and/or modifyJS Injector is distributed in the hope that it will be useful,+2 more
Data Attributes
data-js-injector-iddata-js-injector-typedata-js-injector-status
JS Globals
jsInjectorDashboard
FAQ

Frequently Asked Questions about JS Injector