Specific CSS/JS for Posts and Pages Security & Risk Analysis

wordpress.org/plugins/specific-cssjs-for-posts-and-pages

With Specific CSS/JS for Posts and Pages you can add CSS or JavaScript files to a specific page or post.

400 active installs v1.0 PHP + WP 3.0+ Updated Jan 19, 2011
cssjavascriptjspostposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Specific CSS/JS for Posts and Pages Safe to Use in 2026?

Generally Safe

Score 85/100

Specific CSS/JS for Posts and Pages has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The plugin 'specific-cssjs-for-posts-and-pages' v1.0 demonstrates a generally good security posture in terms of attack surface and data handling, with no AJAX handlers, REST API routes, or shortcodes exposed without authentication. The complete absence of vulnerable SQL queries and external HTTP requests is also positive. However, a significant concern arises from the fact that 0% of the 36 identified output operations are properly escaped. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected and executed in the user's browser. While the plugin has a clean vulnerability history with no recorded CVEs, this can be attributed to its limited features or potentially lack of extensive security auditing. The presence of a taint flow with an unsanitized path, although not classified as critical or high, warrants further investigation as it could lead to unforeseen security issues. The plugin correctly implements nonce and capability checks, which are crucial for secure WordPress development. Overall, while the plugin avoids common pitfalls like raw SQL and exposed endpoints, the unescaped output presents a serious and immediate risk that needs to be addressed.

Key Concerns

  • Unescaped output found
  • Flow with unsanitized path
Vulnerabilities
None known

Specific CSS/JS for Posts and Pages Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Specific CSS/JS for Posts and Pages Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
36
0 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped36 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
ttscj_meta_box (tt-specific-cssjs.php:116)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Specific CSS/JS for Posts and Pages Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initincludes\settings-page.php:12
actionadmin_menutt-specific-cssjs.php:57
actionadd_meta_boxestt-specific-cssjs.php:60
actionsave_posttt-specific-cssjs.php:61
actionwp_headtt-specific-cssjs.php:62
Maintenance & Trust

Specific CSS/JS for Posts and Pages Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedJan 19, 2011
PHP min version
Downloads16K

Community Trust

Rating100/100
Number of ratings1
Active installs400
Developer Profile

Specific CSS/JS for Posts and Pages Developer Profile

techtastico

1 plugin · 400 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Specific CSS/JS for Posts and Pages

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
/specific-cssjs-for-posts-and-pages/

HTML / DOM Fingerprints

Data Attributes
name="_ttscj_css_url"name="_ttscj_js_url"name="_ttscj_header_code"id="ttscj_css_url"id="ttscj_js_url"id="ttscj_header_code"
FAQ

Frequently Asked Questions about Specific CSS/JS for Posts and Pages