Admin-Colour Security & Risk Analysis

wordpress.org/plugins/admin-colour

admin color code Requires at least: 2.0.2 Tested up to: 4.3 Stable tag: 4.3 A quick and easy way to change the admin navigation colour scheme, allo …

10 active installs v3.0 PHP + WP + Updated Aug 9, 2015
adminadmin-menu-colourcolour-codemenumenu-color
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Admin-Colour Safe to Use in 2026?

Generally Safe

Score 85/100

Admin-Colour has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "admin-colour" v3.0 plugin presents a mixed security picture. On the positive side, the static analysis reveals no identified dangerous functions, no SQL queries that are not using prepared statements, no file operations, and no external HTTP requests. The absence of known CVEs in its vulnerability history further suggests a potentially stable past. However, a significant concern arises from the output escaping. With 254 outputs and 0% properly escaped, this indicates a high likelihood of cross-site scripting (XSS) vulnerabilities. While the attack surface appears minimal and there are no recorded taint flows, the lack of output sanitization is a critical oversight that could expose users to malicious scripts. The plugin also exhibits zero nonce and capability checks, which, combined with the lack of any authentication checks on AJAX or REST API endpoints (though none are explicitly declared), could be a weakness if new endpoints are added or if the plugin's functionality is expanded in the future. The key strength is the absence of SQL injection risks and a minimal attack surface, but the pervasive lack of output escaping is a major weakness that overshadows these strengths.

Key Concerns

  • Output escaping: 0% properly escaped
  • Capability checks: 0
  • Nonce checks: 0
Vulnerabilities
None known

Admin-Colour Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Admin-Colour Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
254
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped254 total outputs
Attack Surface

Admin-Colour Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_headAdmin-Colour.php:87
actionadmin_menuAdmin-Colour.php:192
Maintenance & Trust

Admin-Colour Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedAug 9, 2015
PHP min version
Downloads16K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Admin-Colour Developer Profile

alex3410

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Admin-Colour

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
menu-icon-dashboardmenu-icon-postmenu-icon-mediamenu-icon-pagemenu-icon-commentsmenu-icon-appearancemenu-icon-pluginsmenu-icon-users+5 more
FAQ

Frequently Asked Questions about Admin-Colour