Blue Login Style Security & Risk Analysis

wordpress.org/plugins/blue-login-style

Blue Login Style is a tiny plugin which allows to customize your wp-login theme easily with a click.

300 active installs v1.4.0 PHP + WP 3.5+ Updated Dec 26, 2014
admincustomize-wp-login-php-pluginfront-end-loginlogin-formwp-login
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Blue Login Style Safe to Use in 2026?

Generally Safe

Score 85/100

Blue Login Style has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "blue-login-style" plugin v1.4.0 exhibits a mixed security posture. On the positive side, it demonstrates excellent practices regarding SQL queries, utilizing prepared statements for all database interactions, and the absence of known vulnerabilities in its history. Furthermore, the static analysis reveals a minimal attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that could be directly exploited without authentication. There are also no reported dangerous functions or file operations, and no external HTTP requests, which generally contribute to a more secure profile.

However, significant concerns arise from the output escaping analysis, where 0% of the 45 identified outputs are properly escaped. This is a critical weakness that could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is incorporated into these outputs without proper sanitization. The taint analysis also shows 2 flows with unsanitized paths, although these did not reach a critical or high severity level. The complete lack of nonce and capability checks across all entry points, combined with the complete absence of any auth checks on the identified entry points (albeit zero in number), suggests a lack of defensive coding against potential unauthorized access or manipulation, even if the current attack surface is small.

In conclusion, while the plugin avoids common pitfalls like raw SQL and known exploits, the severe deficiency in output escaping and the absence of any authentication or authorization checks on its (currently minimal) entry points present a notable risk. The plugin's history of no vulnerabilities is positive but doesn't mitigate the direct code-level risks identified. Addressing the output escaping and considering the addition of security checks for any future expansion of its functionality would significantly improve its security.

Key Concerns

  • Outputs not properly escaped
  • Taint flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Blue Login Style Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Blue Login Style Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
45
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

0% escaped45 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
blue_login_switch_theme (inc\blue-switch-theme.php:2)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Blue Login Style Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
actionplugins_loadedblue-login.php:18
filterget_avatarinc\blue-about-page.php:6
actionlogin_headerurlinc\blue-functions.php:3
filterlogin_headertitleinc\blue-functions.php:9
actionlogin_headinc\blue-functions.php:15
filterlogin_messageinc\blue-functions.php:23
filterlogin_redirectinc\blue-functions.php:52
filterregistration_redirectinc\blue-functions.php:62
actioninitinc\blue-functions.php:71
actionadmin_menuinc\blue-login-themes.php:15
actionadmin_initinc\blue-login-themes.php:24
actionlogin_enqueue_scriptsinc\blue-login-themes.php:29
actionlogin_enqueue_scriptsinc\blue-login-themes.php:52
actionadmin_enqueue_scriptsinc\blue-settings.php:17
Maintenance & Trust

Blue Login Style Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedDec 26, 2014
PHP min version
Downloads29K

Community Trust

Rating98/100
Number of ratings17
Active installs300
Developer Profile

Blue Login Style Developer Profile

Alimir

4 plugins · 70K total installs

61
trust score
Avg Security Score
74/100
Avg Patch Time
342 days
View full developer profile
Detection Fingerprints

How We Detect Blue Login Style

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/blue-login-style/assets/js/blue-login-media-upload.js
Script Paths
/wp-content/plugins/blue-login-style/assets/js/blue-login-media-upload.js

HTML / DOM Fingerprints

CSS Classes
checktoshow
Data Attributes
id="blue_upload_logo"id="upload_image_button"id="blue_upload_background"id="upload_background_button"name="blue_upload_logo"name="blue_custom_style"+7 more
JS Globals
blue_upload_script
FAQ

Frequently Asked Questions about Blue Login Style