Admin Setting Security & Risk Analysis

wordpress.org/plugins/admin-setting

With Admin Setting you can easily customize the WordPress admin menu and toolbar and customize the admin and login interfaces Admin Setting provides a …

10 active installs v1.0 PHP + WP 4.5+ Updated Jan 19, 2020
admincustomizelogin-pagemenumenu-editor
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Admin Setting Safe to Use in 2026?

Generally Safe

Score 85/100

Admin Setting has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The 'admin-setting' plugin v1.0 exhibits a mixed security posture. On the positive side, it demonstrates strong adherence to secure coding practices by not utilizing raw SQL queries and implementing prepared statements for all database interactions. The absence of known vulnerabilities and CVEs in its history is also a significant strength, suggesting a historically stable and well-maintained codebase. The plugin also appears to have a very limited attack surface, with no apparent AJAX handlers, REST API routes, shortcodes, or cron events exposed, and all entry points are reportedly protected.

However, several critical concerns arise from the static analysis. The presence of three instances of the `unserialize` function is a significant risk. Without proper sanitization of the data being unserialized, this can lead to arbitrary code execution vulnerabilities, especially if the data originates from user input or an untrusted source. Furthermore, the extremely low rate of output escaping (6%) indicates a high probability of cross-site scripting (XSS) vulnerabilities. If user-controlled data is not properly escaped before being displayed, attackers could inject malicious scripts into the website.

In conclusion, while the plugin benefits from a small attack surface and good database practices, the identified use of `unserialize` and the pervasive lack of output escaping present serious security risks that could be exploited. The lack of a history of vulnerabilities might be misleading if these issues have not been previously tested or discovered. Immediate attention should be given to sanitizing unserialized data and implementing robust output escaping mechanisms across all outputs.

Key Concerns

  • Dangerous function: unserialize used
  • Low output escaping (6%)
Vulnerabilities
None known

Admin Setting Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Admin Setting Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
15
1 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$list_menu_remove = unserialize(get_option('list_menu_remove'));index.php:36
unserialize$list_menu_all = unserialize(get_option('list_menu'));index.php:93
unserialize$list_menu_remove = unserialize(get_option('list_menu_remove'));index.php:94

Output Escaping

6% escaped16 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
setting_easy_setting_admin_page_callback (index.php:44)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Admin Setting Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menuindex.php:18
actionadmin_initindex.php:19
actionlogin_enqueue_scriptsindex.php:21
actionlogin_headindex.php:22
filterlogin_headerurlindex.php:23
filterlogin_headertitleindex.php:24
actionadmin_enqueue_scriptsindex.php:26
Maintenance & Trust

Admin Setting Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedJan 19, 2020
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Admin Setting Developer Profile

nenwebteam

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Admin Setting

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/admin-setting/style.css/wp-content/plugins/admin-setting/js/custom-login.js/wp-content/plugins/admin-setting/js/admin-setting.js
Script Paths
/wp-content/plugins/admin-setting/js/custom-login.js/wp-content/plugins/admin-setting/js/admin-setting.js
Version Parameters
admin-setting/style.css?ver=admin-setting/js/custom-login.js?ver=admin-setting/js/admin-setting.js?ver=

HTML / DOM Fingerprints

CSS Classes
admin-mainadmin-contentcontrol-buttontable-second-tdadmin-loginlogin-content
HTML Comments
wp_nonce_field( 'menu-remove' )
Data Attributes
name="default"value="Set Default Setting"name="save"value="Update"name="menuid="+6 more
FAQ

Frequently Asked Questions about Admin Setting