Style Stripper Security & Risk Analysis

wordpress.org/plugins/style-stripper

Removes all inline style tags from the content of posts/pages/custom post types.

80 active installs v1.0.1 PHP + WP 3.0+ Updated May 17, 2016
deleteinline-stylesmultisiteremovestyles
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Style Stripper Safe to Use in 2026?

Generally Safe

Score 85/100

Style Stripper has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The static analysis of the "style-stripper" v1.0.1 plugin reveals an exceptionally clean codebase with no identified attack surface, dangerous functions, direct SQL queries, or file operations. The code also demonstrates strong adherence to security best practices by performing 100% output escaping and exclusively using prepared statements for any SQL interactions, though none were detected. Furthermore, the plugin has no recorded vulnerability history, indicating a history of secure development or a lack of prior security scrutiny. This presents a very strong security posture at first glance.

However, the analysis also highlights a complete absence of nonces and capability checks. While the plugin reports zero entry points that require authorization, this lack of protective measures means that if any new functionalities were to be introduced or if the interpretation of existing functionalities changes, they would be inherently vulnerable to unauthorized access or manipulation. The zero taint flows analyzed could also mean that the analysis tool was unable to effectively scan the plugin's code, or that the plugin's functionality is so minimal that no data flows were detected as requiring sanitization. This absence of detected taint flows, while positive, should be viewed with a slight caution.

In conclusion, "style-stripper" v1.0.1 exhibits excellent security practices within its current scope, with no immediate exploitable vulnerabilities apparent from the static analysis or historical data. The primary concern lies in the lack of any authorization checks, leaving a potential backdoor for future development. The absence of detected taint flows warrants a minor degree of caution, suggesting either extremely secure code or potential limitations in the analysis.

Key Concerns

  • No Nonce Checks
  • No Capability Checks
Vulnerabilities
None known

Style Stripper Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Style Stripper Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Style Stripper Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadd_meta_boxesstyle-stripper.php:14
filterthe_contentstyle-stripper.php:15
Maintenance & Trust

Style Stripper Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedMay 17, 2016
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs80
Developer Profile

Style Stripper Developer Profile

ericjuden

7 plugins · 210 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Style Stripper

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Style Stripper