Style Press Security & Risk Analysis

wordpress.org/plugins/style-press

This plugin will allow you to add CSS style definitions to your entire site, or individual posts or pages.

10 active installs v0.1 PHP + WP 2.8+ Updated Aug 3, 2010
csscss-overridecustom-cssstyle
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Style Press Safe to Use in 2026?

Generally Safe

Score 85/100

Style Press has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The 'style-press' plugin v0.1 exhibits a mixed security posture. On the positive side, it has a very small attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all observed SQL queries utilize prepared statements, and there are no known vulnerabilities or CVEs associated with this plugin. This suggests a developer with some awareness of secure coding practices, particularly regarding database interactions.

However, a significant concern arises from the complete lack of output escaping across all 30 detected output instances. This is a critical flaw that leaves the plugin highly susceptible to Cross-Site Scripting (XSS) vulnerabilities. Any user-controlled input that is displayed without proper sanitization can be exploited by an attacker to inject malicious scripts. Additionally, while there is one nonce check, the absence of capability checks on any potential entry points is also a weakness, though the limited attack surface mitigates the immediate impact. The taint analysis showing zero flows is positive, but this may be due to the limited scope of analysis or the simple nature of the plugin's functionality, and does not negate the XSS risk.

In conclusion, the 'style-press' plugin v0.1 has strengths in its minimal attack surface and secure database practices. Nevertheless, the pervasive lack of output escaping presents a severe and immediate security risk (XSS) that needs urgent remediation. The absence of capability checks is a secondary concern. The vulnerability history being clean is a good sign but does not excuse the critical output escaping deficiency.

Key Concerns

  • 0% properly escaped output (XSS risk)
  • 0 capability checks
Vulnerabilities
None known

Style Press Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Style Press Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
30
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped30 total outputs
Attack Surface

Style Press Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menustyle-press.php:51
actionwp_headstyle-press.php:52
actionadmin_headstyle-press.php:53
filterplugin_action_linksstyle-press.php:54
actionadmin_initstyle-press.php:55
actionadmin_menustyle-press.php:56
actionsave_poststyle-press.php:57
Maintenance & Trust

Style Press Maintenance & Trust

Maintenance Signals

WordPress version tested3.01
Last updatedAug 3, 2010
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Style Press Developer Profile

GrandSlambert

7 plugins · 170 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Style Press

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/style-press/style-press.css

HTML / DOM Fingerprints

CSS Classes
style-press-textarea
HTML Comments
<!-- Styles added by Style Press. --><!-- End Style Press styles. -->
Data Attributes
name="style_press_css"id="style_press_css"name="style_press_noncename"id="style_press_noncename"
FAQ

Frequently Asked Questions about Style Press