
Admin Setting Security & Risk Analysis
wordpress.org/plugins/admin-settingWith Admin Setting you can easily customize the WordPress admin menu and toolbar and customize the admin and login interfaces Admin Setting provides a …
Is Admin Setting Safe to Use in 2026?
Generally Safe
Score 85/100Admin Setting has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'admin-setting' plugin v1.0 exhibits a mixed security posture. On the positive side, it demonstrates strong adherence to secure coding practices by not utilizing raw SQL queries and implementing prepared statements for all database interactions. The absence of known vulnerabilities and CVEs in its history is also a significant strength, suggesting a historically stable and well-maintained codebase. The plugin also appears to have a very limited attack surface, with no apparent AJAX handlers, REST API routes, shortcodes, or cron events exposed, and all entry points are reportedly protected.
However, several critical concerns arise from the static analysis. The presence of three instances of the `unserialize` function is a significant risk. Without proper sanitization of the data being unserialized, this can lead to arbitrary code execution vulnerabilities, especially if the data originates from user input or an untrusted source. Furthermore, the extremely low rate of output escaping (6%) indicates a high probability of cross-site scripting (XSS) vulnerabilities. If user-controlled data is not properly escaped before being displayed, attackers could inject malicious scripts into the website.
In conclusion, while the plugin benefits from a small attack surface and good database practices, the identified use of `unserialize` and the pervasive lack of output escaping present serious security risks that could be exploited. The lack of a history of vulnerabilities might be misleading if these issues have not been previously tested or discovered. Immediate attention should be given to sanitizing unserialized data and implementing robust output escaping mechanisms across all outputs.
Key Concerns
- Dangerous function: unserialize used
- Low output escaping (6%)
Admin Setting Security Vulnerabilities
Admin Setting Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Admin Setting Attack Surface
WordPress Hooks 7
Maintenance & Trust
Admin Setting Maintenance & Trust
Maintenance Signals
Community Trust
Admin Setting Alternatives
WP Custom Admin Interface
wp-custom-admin-interface
With WP Custom Admin Interface you can easily customise the WordPress admin and login interfaces.
WP Adminify – White Label WordPress, Admin Menu Editor, Login Customizer
adminify
Transform your WordPress admin into a fully white-labeled, organized client dashboard. Customize, Dark mode, Secure, Boost productivity, and more.
Ultimate Dashboard – Custom WordPress Dashboard
ultimate-dashboard
The #1 Plugin to Customize the WordPress Dashboard!
Admin Custom Login
admin-custom-login
Customize Your WordPress Login Screen Amazingly - Add Own Logo, Add Social Profiles, Login Form Positions, Background Image Slide Show
Admin Tools
admin-tools
Admin Tools Helps you to get better admin for your customers. Manage your menus, plugins, Top Bar, updates and more
Admin Setting Developer Profile
1 plugin · 10 total installs
How We Detect Admin Setting
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/admin-setting/style.css/wp-content/plugins/admin-setting/js/custom-login.js/wp-content/plugins/admin-setting/js/admin-setting.js/wp-content/plugins/admin-setting/js/custom-login.js/wp-content/plugins/admin-setting/js/admin-setting.jsadmin-setting/style.css?ver=admin-setting/js/custom-login.js?ver=admin-setting/js/admin-setting.js?ver=HTML / DOM Fingerprints
admin-mainadmin-contentcontrol-buttontable-second-tdadmin-loginlogin-contentwp_nonce_field( 'menu-remove' )name="default"value="Set Default Setting"name="save"value="Update"name="menuid="+6 more