Strict CSP Security & Risk Analysis

wordpress.org/plugins/strict-csp

Enforces a Strict Content Security Policy on the frontend and login screen to help mitigate any XSS vulnerabilities.

20 active installs v0.3.2 PHP 7.2+ WP 6.4+ Updated Nov 30, 2025
security
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Strict CSP Safe to Use in 2026?

Generally Safe

Score 100/100

Strict CSP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The "strict-csp" plugin version 0.3.2 exhibits an exceptionally strong security posture based on the provided static analysis and vulnerability history. The absence of any identified attack surface, dangerous functions, unsanitized taint flows, or direct SQL queries is a significant strength. Furthermore, the plugin appears to handle output properly and avoid file operations or external HTTP requests. This suggests a well-developed and secure codebase, with a strong focus on defensive programming practices.

The lack of any recorded vulnerabilities, past or present, reinforces this positive assessment. There are no unpatched CVEs, and the plugin has not historically been associated with common vulnerability types. This track record indicates a commitment to security by the developers or a lack of past attempts to exploit it, which, combined with the clean code analysis, suggests a low overall risk profile.

While the data paints a picture of a very secure plugin, the complete absence of capability checks and nonce checks on its entry points (even though there are zero entry points identified) is a theoretical concern. If any new entry points were to be introduced in future versions without proper authorization mechanisms, this could create an immediate risk. However, based on the current analysis, this plugin appears to be a highly secure option.

Key Concerns

  • No capability checks identified
  • No nonce checks identified
Vulnerabilities
None known

Strict CSP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Strict CSP Release Timeline

v0.3.2Current
v0.3.1
v0.3.0
Code Analysis
Analyzed Apr 16, 2026

Strict CSP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Strict CSP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterwp_headersstrict-csp.php:146
filterwp_script_attributesstrict-csp.php:149
filterwp_inline_script_attributesstrict-csp.php:153
filterembed_oembed_htmlstrict-csp.php:158
actionlogin_initstrict-csp.php:160
Maintenance & Trust

Strict CSP Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedNov 30, 2025
PHP min version7.2
Downloads575

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Strict CSP Developer Profile

Weston Ruter

26 plugins · 437K total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
4499 days
View full developer profile
Detection Fingerprints

How We Detect Strict CSP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Strict CSP