Super Simple Custom CSS Security & Risk Analysis

wordpress.org/plugins/super-simple-custom-css

Super Simple Custom CSS wordpress plugin is used for adding custom styling to all post, all page,specific post,specific page or sitewide.

300 active installs v2.0 PHP + WP 3.8+ Updated Aug 30, 2020
custom-csssimple-cssspecific-cssspecific-page-cssspecific-post-css
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Super Simple Custom CSS Safe to Use in 2026?

Generally Safe

Score 85/100

Super Simple Custom CSS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "super-simple-custom-css" v2.0 plugin exhibits a generally positive security posture with a notable absence of known vulnerabilities and a small attack surface. The static analysis reveals no obvious entry points like AJAX handlers, REST API routes, or shortcodes that are unprotected. Additionally, the absence of dangerous functions, file operations, and external HTTP requests further strengthens its security. The vulnerability history is clean, with no recorded CVEs, suggesting a stable and well-maintained codebase regarding past security issues.

However, there are several areas of concern within the code. The low percentage of SQL queries using prepared statements (12%) indicates a significant risk of SQL injection vulnerabilities, especially given the 17 total SQL queries. Similarly, the very low rate of proper output escaping (5%) poses a high risk of Cross-Site Scripting (XSS) vulnerabilities across the 43 identified output points. The complete lack of nonce checks and capability checks on potential entry points, though the attack surface appears minimal, means that if any are discovered or added in the future, they would likely be unprotected. This combination of factors, particularly the prevalent SQL and output escaping issues, necessitates careful consideration of the plugin's security, despite its clean vulnerability history.

Key Concerns

  • Raw SQL queries without prepared statements
  • Low percentage of properly escaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Super Simple Custom CSS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Super Simple Custom CSS Code Analysis

Dangerous Functions
0
Raw SQL Queries
15
2 prepared
Unescaped Output
41
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

12% prepared17 total queries

Output Escaping

5% escaped43 total outputs
Attack Surface

Super Simple Custom CSS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_headindex.php:77
actionadmin_menuindex.php:93
actionwp_headindex.php:535
actionadd_meta_boxesindex.php:545
actionadd_meta_boxesindex.php:554
actionsave_postindex.php:598
Maintenance & Trust

Super Simple Custom CSS Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedAug 30, 2020
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings1
Active installs300
Developer Profile

Super Simple Custom CSS Developer Profile

ColoredWeb

1 plugin · 300 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Super Simple Custom CSS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/super-simple-custom-css/library/chosen/chosen.css/wp-content/plugins/super-simple-custom-css/library/chosen/chosen.jquery.js
Script Paths
/wp-content/plugins/super-simple-custom-css/library/chosen/chosen.jquery.js
Version Parameters
super-simple-custom-css/library/chosen/chosen.css?ver=super-simple-custom-css/library/chosen/chosen.jquery.js?ver=

HTML / DOM Fingerprints

CSS Classes
cw_sscc_btnt_selectedadd_c_buttonsscs_editor
Data Attributes
data-plugin-id="sscc"
JS Globals
acemonokai
FAQ

Frequently Asked Questions about Super Simple Custom CSS