Script Logic Security & Risk Analysis

wordpress.org/plugins/script-logic

Script Logic lets you control on which pages scripts and style sheets load using WP's conditional tags.

10 active installs v0.3 PHP + WP 2.8+ Updated Jul 10, 2014
adminconditional-tagsscriptspeedstyle
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Script Logic Safe to Use in 2026?

Generally Safe

Score 85/100

Script Logic has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "script-logic" plugin v0.3 exhibits a mixed security posture. On the positive side, it demonstrates good practices by having no recorded CVEs and no detected taint flows, indicating a generally stable codebase with respect to known vulnerabilities and complex data injection risks. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its direct attack surface. Furthermore, all SQL queries utilize prepared statements, which is a crucial security measure against SQL injection. The plugin also has one capability check, which is better than none.

However, several critical security concerns are present. The use of the `unserialize` function, especially without clear input validation or context, is a major risk, as unserialization of untrusted data can lead to remote code execution. The complete lack of output escaping for all identified output points is highly alarming and presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities. The absence of nonce checks on potential entry points, though the attack surface is currently zero, means that if entry points were introduced in the future, they would likely be unprotected. The vulnerability history being clean is a strength, but the active code risks, particularly unserialize and unescaped output, overshadow this positive aspect.

In conclusion, while the plugin has a clean vulnerability history and has implemented prepared statements for SQL, the presence of `unserialize` and the complete lack of output escaping represent critical security flaws that could easily be exploited. The absence of entry points is a protective factor, but the inherent risks within the code itself make this plugin a significant concern.

Key Concerns

  • Presence of 'unserialize' function
  • 100% of output unescaped
  • No nonce checks on entry points
Vulnerabilities
None known

Script Logic Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Script Logic Code Analysis

Dangerous Functions
4
Raw SQL Queries
0
0 prepared
Unescaped Output
16
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
2
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$registered_scripts = unserialize(get_option('sb_registered_scripts'));options.php:14
unserialize$registered_styles = unserialize(get_option('sb_registered_styles'));options.php:15
unserialize$sl_settings = unserialize($sl_settings);script-logic.php:104
unserialize$sl_settings = unserialize($sl_settings);script-logic.php:169

Output Escaping

0% escaped16 total outputs
Attack Surface

Script Logic Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_enqueue_scriptsscript-logic.php:26
actionswitch_themescript-logic.php:27
actionadmin_initscript-logic.php:28
actionadmin_menuscript-logic.php:29
actionwp_print_scriptsscript-logic.php:31
actionwp_enqueue_scriptsscript-logic.php:32
Maintenance & Trust

Script Logic Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedJul 10, 2014
PHP min version
Downloads3K

Community Trust

Rating60/100
Number of ratings2
Active installs10
Developer Profile

Script Logic Developer Profile

Tahir Yasin

3 plugins · 430 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Script Logic

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/script-logic/js/admin.js/wp-content/plugins/script-logic/js/scriptlogic.js
Script Paths
/wp-content/plugins/script-logic/js/admin.js/wp-content/plugins/script-logic/js/scriptlogic.js
Version Parameters
script-logic/js/admin.js?ver=script-logic/js/scriptlogic.js?ver=

HTML / DOM Fingerprints

JS Globals
scriptLogicObj
FAQ

Frequently Asked Questions about Script Logic