AdminPad Security & Risk Analysis

wordpress.org/plugins/adminpad

AdminPad is a simple note taker for site administrator only.

900 active installs v2.6 PHP 8.0+ WP 5.0+ Updated Dec 9, 2025
admin-notenote-takernotepadsimple-notesite-administrator
99
A · Safe
CVEs total1
Unpatched0
Last CVESep 29, 2022
Safety Verdict

Is AdminPad Safe to Use in 2026?

Generally Safe

Score 99/100

AdminPad has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Sep 29, 2022Updated 3mo ago
Risk Assessment

The "adminpad" plugin v2.6 presents a mixed security posture. On the positive side, the static analysis reveals no direct entry points like AJAX handlers, REST API routes, or shortcodes that are unprotected. SQL queries are 100% prepared, and there are no apparent file operations or external HTTP requests, which are good security practices. The presence of nonce and capability checks, even if limited, suggests an awareness of security principles.

However, a significant concern arises from the output escaping. With 2 total outputs and 0% properly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that originates from the plugin's processing, if not properly escaped, could be exploited by attackers. While the taint analysis shows no unsanitized paths or critical/high severity flows, this may be due to a limited attack surface or the specific nature of the observed flows, and doesn't negate the XSS risk from unescaped output.

The vulnerability history indicates one past high-severity vulnerability, a Cross-Site Request Forgery (CSRF), which has since been patched. While there are no currently unpatched vulnerabilities, this history, coupled with the significant output escaping issue, suggests that the plugin, despite its strengths in other areas, has had security weaknesses that could reappear if not carefully managed. In conclusion, the plugin has implemented several good security controls, but the critical flaw in output escaping represents a substantial risk that needs immediate attention. The past CSRF vulnerability also warrants vigilance.

Key Concerns

  • Output not properly escaped
  • 1 high severity CVE in history
Vulnerabilities
1

AdminPad Security Vulnerabilities

CVEs by Year

1 CVE in 2022
2022
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

CVE-2022-2762high · 8.8Cross-Site Request Forgery (CSRF)

AdminPad <= 2.1 - Cross-Site Request Forgery

Sep 29, 2022 Patched in 2.2 (481d)
Code Analysis
Analyzed Mar 16, 2026

AdminPad Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
bsft_adminpad_form (adminpad.php:27)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

AdminPad Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_dashboard_setupadminpad.php:68
Maintenance & Trust

AdminPad Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 9, 2025
PHP min version8.0
Downloads19K

Community Trust

Rating100/100
Number of ratings6
Active installs900
Developer Profile

AdminPad Developer Profile

Iftekhar Bhuiyan

1 plugin · 900 total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
481 days
View full developer profile
Detection Fingerprints

How We Detect AdminPad

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
textarea-wrap
Data Attributes
data-nonce-value
FAQ

Frequently Asked Questions about AdminPad