
Admin Loaded Display Security & Risk Analysis
wordpress.org/plugins/admin-loaded-displayIn the admin bar, this plugin, adds a display that shows the registered
Is Admin Loaded Display Safe to Use in 2026?
Generally Safe
Score 100/100Admin Loaded Display has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'admin-loaded-display' plugin v1.0.2 exhibits a strong security posture based on the provided static analysis. There are no identified entry points such as AJAX handlers, REST API routes, shortcodes, or cron events, which significantly limits the potential attack surface. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests contributes positively to its security. The adherence to prepared statements for all SQL queries is a critical best practice that prevents SQL injection vulnerabilities.
However, the analysis does reveal a significant concern: 100% of the identified output contains unescaped data. This means that any data rendered to the user interface could potentially be vulnerable to Cross-Site Scripting (XSS) attacks if the data originates from an untrusted source or is not properly sanitized before output. While the taint analysis shows no specific flows indicating this, the lack of output escaping is a common gateway for XSS. The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive indicator. Nevertheless, the lack of capability checks and nonces, combined with the unescaped output, suggests that while the plugin may not have been historically exploited, it possesses inherent weaknesses that could be exploited in the future if not addressed.
In conclusion, the 'admin-loaded-display' plugin demonstrates robust code hygiene in areas like SQL handling and attack surface minimization. However, the complete absence of output escaping is a critical flaw that demands immediate attention. The clean vulnerability history is encouraging, but it doesn't negate the risks posed by the unaddressed XSS vulnerability. Addressing the output escaping would significantly bolster the plugin's security.
Key Concerns
- Unescaped output detected
- Missing nonce checks
- Missing capability checks
Admin Loaded Display Security Vulnerabilities
Admin Loaded Display Code Analysis
Output Escaping
Admin Loaded Display Attack Surface
WordPress Hooks 4
Maintenance & Trust
Admin Loaded Display Maintenance & Trust
Maintenance Signals
Community Trust
Admin Loaded Display Alternatives
No alternatives data available yet.
Admin Loaded Display Developer Profile
2 plugins · 50 total installs
How We Detect Admin Loaded Display
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/admin-loaded-display/js/ald_scripts.js/wp-content/plugins/admin-loaded-display/css/style.css/wp-content/plugins/admin-loaded-display/js/ald_scripts.jsadmin-loaded-display/js/ald_scripts.js?ver=admin-loaded-display/css/style.css?ver=HTML / DOM Fingerprints
ald-boxald_loaded