Site Specific CSS Security & Risk Analysis

wordpress.org/plugins/site-specific-css

Add site specific CSS to each blog individually, instead of changing your theme or using a million child themes.

10 active installs v1.0.1 PHP + WP 3.0+ Updated Nov 22, 2010
child-of-child-themechild-themecsssite-specificskin
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Site Specific CSS Safe to Use in 2026?

Generally Safe

Score 85/100

Site Specific CSS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The 'site-specific-css' plugin version 1.0.1 presents a generally good security posture based on the provided static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events, coupled with the lack of dangerous functions and file operations, significantly reduces the potential attack surface. All identified SQL queries utilize prepared statements, which is a strong security practice. The plugin also demonstrates an awareness of security by including at least one capability check. However, a significant concern arises from the total lack of output escaping across all identified outputs. This means that any data displayed to users could potentially be vulnerable to cross-site scripting (XSS) attacks, as user-supplied input is not being properly sanitized before rendering. The plugin's vulnerability history is clean, with no recorded CVEs, which is positive, but this could also indicate a lack of extensive security auditing or a very small user base that hasn't attracted attacker attention yet. The overall security is good due to limited attack surface and secure data handling for SQL, but the unescaped output is a critical weakness that needs immediate attention.

Key Concerns

  • All outputs are unescaped
Vulnerabilities
None known

Site Specific CSS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Site Specific CSS Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
kdari_site_specific_css_options (site-specific-css.php:18)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Site Specific CSS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menusite-specific-css.php:10
actionwp_headsite-specific-css.php:79
Maintenance & Trust

Site Specific CSS Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedNov 22, 2010
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Site Specific CSS Developer Profile

Luke Gedeon

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Site Specific CSS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/site-specific-css/

HTML / DOM Fingerprints

CSS Classes
wrap
FAQ

Frequently Asked Questions about Site Specific CSS