WP Mouse Custom Cursor Security & Risk Analysis

wordpress.org/plugins/wp-mouse-custom-cursor

WP Mouse Cursors is a WordPress plugin to create custom cursors for your website. Use a Good looking Mouse cursor for WP. There are 5 diffrent types o …

200 active installs v1.2 PHP 7.0+ WP 4.7+ Updated Feb 6, 2023
ballcursormousemouse-cursorwp-mouse-cursor
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Mouse Custom Cursor Safe to Use in 2026?

Generally Safe

Score 85/100

WP Mouse Custom Cursor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The 'wp-mouse-custom-cursor' plugin v1.2 exhibits a generally positive security posture with no known vulnerabilities or critical code signals suggesting immediate risk. The absence of CVEs and the static analysis showing no dangerous functions, SQL queries without prepared statements, file operations, or external HTTP requests are all strong indicators of good development practices. The plugin also reports zero entry points without authentication checks, which is an excellent sign for limiting its attack surface.

However, a significant concern arises from the static analysis revealing that 0% of output escaping is properly handled across its 9 total outputs. This suggests a high likelihood of Cross-Site Scripting (XSS) vulnerabilities, as unsanitized output directly presented to users can be exploited. While taint analysis did not report any specific flows, the lack of proper output escaping creates a broad opportunity for such attacks to be injected through various inputs that might eventually be displayed.

In conclusion, while the plugin has a strong foundation by avoiding common pitfalls like raw SQL or insecure AJAX handlers, the critical deficiency in output escaping presents a substantial risk. The plugin's clean vulnerability history is encouraging but does not mitigate the immediate threat posed by the unescaped output. Developers should prioritize addressing the output escaping issue to solidify the plugin's security.

Key Concerns

  • Output escaping is not properly handled
Vulnerabilities
None known

WP Mouse Custom Cursor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Mouse Custom Cursor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

jQuery

Output Escaping

0% escaped9 total outputs
Attack Surface

WP Mouse Custom Cursor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionwp_enqueue_scriptswp-mouse-custom-cursor.php:256
actionwp_headwp-mouse-custom-cursor.php:257
actionwp_headwp-mouse-custom-cursor.php:258
actionwp_headwp-mouse-custom-cursor.php:264
actionwp_headwp-mouse-custom-cursor.php:268
actionwp_headwp-mouse-custom-cursor.php:273
actionwp_headwp-mouse-custom-cursor.php:278
actionwp_headwp-mouse-custom-cursor.php:283
actioncustomize_registerwp-mouse-custom-cursor.php:326
Maintenance & Trust

WP Mouse Custom Cursor Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedFeb 6, 2023
PHP min version7.0
Downloads13K

Community Trust

Rating86/100
Number of ratings3
Active installs200
Developer Profile

WP Mouse Custom Cursor Developer Profile

Ninetyseven Infotech

4 plugins · 810 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Mouse Custom Cursor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
hover
FAQ

Frequently Asked Questions about WP Mouse Custom Cursor