WPMU Custom CSS Security & Risk Analysis

wordpress.org/plugins/wpmu-custom-css

WPMU Custom CSS is a plugin for wordpress mu that helps bloggers to edit their theme style securely. Just like wordpress.com custom css paid upgrade.

10 active installs v1.06 PHP + WP 2.7+ Updated Jan 22, 2010
cssmuthemewordpress-muwpmu
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPMU Custom CSS Safe to Use in 2026?

Generally Safe

Score 85/100

WPMU Custom CSS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The wpmu-custom-css plugin, in version 1.06, presents a concerning security posture despite having no recorded historical vulnerabilities. The static analysis reveals a significant lack of security best practices, particularly in output escaping and the presence of dangerous functions. While the attack surface appears minimal with no AJAX handlers, REST API routes, shortcodes, or cron events, this is overshadowed by the code quality concerns. The analysis indicates that all 6 output operations are unescaped, meaning user-supplied data, if it were to reach these output points, could lead to cross-site scripting (XSS) vulnerabilities. Furthermore, the presence of two 'preg_replace(/e)' functions is a red flag, as this function can be notoriously insecure if not handled with extreme care, potentially allowing for code injection or other arbitrary execution vulnerabilities. The taint analysis also highlights two flows with unsanitized paths, which could represent potential security issues if these paths are influenced by external input. The absence of nonce checks and capability checks on any potential entry points (though none were identified) is a weakness that could be exploited if new entry points were introduced or if the current minimal attack surface is misclassified. Given the lack of historical vulnerabilities, one might infer a history of careful development or luck. However, the current code analysis reveals inherent risks that could lead to future vulnerabilities. The plugin's strengths lie in its minimal attack surface and the use of prepared statements for SQL queries, but these are significantly undermined by critical weaknesses in output handling and the use of dangerous functions.

Key Concerns

  • Unescaped output detected
  • Dangerous function detected (preg_replace(/e))
  • Taint flows with unsanitized paths
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WPMU Custom CSS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WPMU Custom CSS Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

preg_replace(/e)preg_replace('/ewpmu-custom-css.php:127
preg_replace(/e)preg_replace('/ewpmu-custom-css.php:134

Output Escaping

0% escaped6 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
custom_css_page (wpmu-custom-css.php:71)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WPMU Custom CSS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwpmueditblogactionwpmu-custom-css.php:30
actionupdate_wpmu_optionswpmu-custom-css.php:38
actionwpmu_optionswpmu-custom-css.php:55
actionadmin_menuwpmu-custom-css.php:236
actionwp_headwpmu-custom-css.php:237
Maintenance & Trust

WPMU Custom CSS Maintenance & Trust

Maintenance Signals

WordPress version tested2.8.6
Last updatedJan 22, 2010
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WPMU Custom CSS Developer Profile

Hassan1

4 plugins · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WPMU Custom CSS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpmu-custom-css/wpmu-custom-css.php

HTML / DOM Fingerprints

HTML Comments
<!-- Custom CSS : http://wpwave.com/ -->
FAQ

Frequently Asked Questions about WPMU Custom CSS