WP Fossil Security & Risk Analysis

wordpress.org/plugins/wp-fossil

Provides support for media queries and emulating CSS3 pseudo-classes and attribute selectors in Internet Explorer 6-8.

30 active installs v1.0 PHP + WP 3.5+ Updated Jan 18, 2014
css3ieie8media-queries
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Fossil Safe to Use in 2026?

Generally Safe

Score 85/100

WP Fossil has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "wp-fossil" plugin v1.0 exhibits a seemingly strong security posture based on the provided static analysis and vulnerability history. The absence of detected AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code analysis shows no dangerous functions, no file operations, no external HTTP requests, and no taint analysis findings, all of which are positive indicators. The SQL queries are all prepared, which is a good practice.

However, a significant concern arises from the output escaping. With 100% of outputs not properly escaped, this presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is displayed by the plugin without proper sanitization could be exploited. Additionally, the complete lack of nonce checks and capability checks, combined with zero detected entry points, is an anomaly. While a zero attack surface is good, the absence of these fundamental security checks suggests that either the plugin is exceptionally simple and has no dynamic content, or there's a possibility that the analysis tools did not correctly identify all entry points or the need for these checks. The clean vulnerability history is positive but doesn't negate the identified code-level risks.

In conclusion, while "wp-fossil" v1.0 benefits from a minimal attack surface and good SQL practices, the unescaped outputs create a critical weakness that could lead to XSS. The absence of nonce and capability checks warrants further investigation to ensure the plugin is not inadvertently exposing functionality. The plugin's security is compromised by its handling of output data, despite other positive indicators.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP Fossil Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Fossil Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

WP Fossil Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_headwp-fossil.php:46
Maintenance & Trust

WP Fossil Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedJan 18, 2014
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs30
Developer Profile

WP Fossil Developer Profile

Zach Schnackel

3 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Fossil

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-fossil/assets/js/build/ie.min.js
Script Paths
/wp-content/plugins/wp-fossil/assets/js/build/ie.min.js

HTML / DOM Fingerprints

HTML Comments
<![if lt IE 9]>
FAQ

Frequently Asked Questions about WP Fossil