
Scripts n Styles Security & Risk Analysis
wordpress.org/plugins/scripts-n-stylesThis plugin allows Admin users to individually add HTML, custom CSS, Classes and JavaScript directly to Post, Pages or any other custom post types.
Is Scripts n Styles Safe to Use in 2026?
Generally Safe
Score 85/100Scripts n Styles has a strong security track record. Known vulnerabilities have been patched promptly.
The 'scripts-n-styles' plugin v3.5.8 exhibits a mixed security posture. On the positive side, it demonstrates good practices with 100% of SQL queries using prepared statements and a significant number of nonce and capability checks. There are no critical or high-severity vulnerabilities identified in past CVEs, and no critical or high-severity taint flows were found in the static analysis. The absence of external HTTP requests and dangerous functions further bolsters its security.
However, several areas raise concerns. The plugin has a substantial attack surface with 18 entry points, and critically, 4 of these (AJAX handlers) lack authentication checks. While the number of unescaped outputs is moderate (48% properly escaped), this still represents a significant risk of Cross-Site Scripting (XSS) vulnerabilities, especially considering the plugin's past vulnerability history which includes an XSS issue. The presence of a past medium-severity CVE indicates that the plugin has had exploitable flaws, and the fact that it was addressed suggests a willingness to fix issues, but the initial occurrence is a warning sign.
In conclusion, while the plugin has strengths in its handling of database interactions and input validation via nonces and capabilities, the unprotected AJAX endpoints and the potential for XSS due to incomplete output escaping present the most immediate and concerning risks. The historical medium-severity XSS vulnerability underscores the need for vigilance regarding output sanitization.
Key Concerns
- Unprotected AJAX handlers
- Moderate percentage of unescaped output
- Past medium severity CVE
Scripts n Styles Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Scripts n Styles <= 3.5.3 - Authenticated (Administrator+) Stored Cross-Site Scripting
Scripts n Styles Code Analysis
Bundled Libraries
Output Escaping
Data Flow Analysis
Scripts n Styles Attack Surface
AJAX Handlers 14
Shortcodes 4
WordPress Hooks 38
Maintenance & Trust
Scripts n Styles Maintenance & Trust
Maintenance Signals
Community Trust
Scripts n Styles Alternatives
CustomEasy
customeasy
Gives you a quick and superlight way to inject codes in your website's HEAD or FOOTER
Nuno Sarmento Custom CSS – JS
nuno-sarmento-custom-css-js
Custom CSS & JavaScripts functions.
CMC Hook
cmc-hook
Register php functions to hooks(action and filter), run php codes safely, create and test plugins all from dashboard tools
Simple Custom CSS Plugin
simple-custom-css
Add Custom CSS to your WordPress site without any hassles.
Admin CSS MU
admin-css-mu
Add custom CSS to style the WordPress Admin. Works with Multisites.
Scripts n Styles Developer Profile
1 plugin · 30K total installs
How We Detect Scripts n Styles
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/scripts-n-styles/sns-core/sns-core.js/wp-content/plugins/scripts-n-styles/sns-core/sns-core.css/wp-content/plugins/scripts-n-styles/sns-core/sns-core.jsscripts-n-styles/sns-core/sns-core.js?ver=scripts-n-styles/sns-core/sns-core.css?ver=HTML / DOM Fingerprints
data-sns-idSnS_Settings[sns_shortcode][hoops]