Custom CSS/JS Security & Risk Analysis

wordpress.org/plugins/wp-custom-cssjs

WP Custom CSS JS plugin allows you to add any HTML, CSS, Javascript, jQuery or Tracking Pixel easily on your wordpress site right from your dashboard.

800 active installs v1.4.2 PHP 5.6+ WP 4.5+ Updated Mar 16, 2025
cssjavascriptjqueryjstracking-pixel
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom CSS/JS Safe to Use in 2026?

Generally Safe

Score 92/100

Custom CSS/JS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The plugin "wp-custom-cssjs" v1.4.2 exhibits a generally good security posture with no reported vulnerabilities or critical security findings in the static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the complete use of prepared statements for SQL queries and the presence of a nonce check are positive indicators of secure coding practices.

However, a significant concern arises from the lack of output escaping. With 14 total outputs and 0% properly escaped, this presents a substantial risk for Cross-Site Scripting (XSS) vulnerabilities. Any dynamic content displayed by the plugin is susceptible to injection, potentially allowing attackers to execute arbitrary JavaScript in the user's browser. While the plugin has no known vulnerability history, the lack of output escaping could lead to severe security issues if not addressed.

In conclusion, the plugin demonstrates strengths in its limited attack surface and secure SQL handling. Nevertheless, the critical deficiency in output escaping creates a high-risk area that requires immediate attention to prevent potential XSS attacks. The absence of past vulnerabilities might be due to the plugin's limited functionality or perhaps a lack of thorough security auditing in its past.

Key Concerns

  • 0% output escaping
Vulnerabilities
None known

Custom CSS/JS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom CSS/JS Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped14 total outputs
Attack Surface

Custom CSS/JS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actionadmin_menuindex.php:38
actioninitindex.php:39
actionadmin_noticesindex.php:97
filterpie_header_scriptsindex.php:102
actionwp_headindex.php:103
actionwp_headindex.php:106
actionwp_headindex.php:109
filterpie_footer_scriptsindex.php:112
actionwp_footerindex.php:113
actionwp_footerindex.php:116
actionwp_footerindex.php:119
Maintenance & Trust

Custom CSS/JS Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedMar 16, 2025
PHP min version5.6
Downloads15K

Community Trust

Rating100/100
Number of ratings1
Active installs800
Developer Profile

Custom CSS/JS Developer Profile

johnibom

1 plugin · 800 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom CSS/JS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-custom-cssjs/

HTML / DOM Fingerprints

JS Globals
pieCsutomCJ
FAQ

Frequently Asked Questions about Custom CSS/JS