Client Portal : SuiteDash Direct Login Security & Risk Analysis

wordpress.org/plugins/client-portal-suitedash-login

WordPress Client Portal Plugin that allows you to add a custom login function directly on your WordPress site that is tied to your SuiteDash account.

1K active installs v1.9.0 PHP + WP 3.0.1+ Updated Nov 19, 2025
client-portalcustomer-portalwhite-label
100
A · Safe
CVEs total1
Unpatched0
Last CVEJul 20, 2023
Safety Verdict

Is Client Portal : SuiteDash Direct Login Safe to Use in 2026?

Generally Safe

Score 100/100

Client Portal : SuiteDash Direct Login has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Jul 20, 2023Updated 4mo ago
Risk Assessment

The 'client-portal-suitedash-login' plugin v1.9.0 presents a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries and has no reported vulnerabilities in its current version. The absence of dangerous functions, file operations, and critical/high severity taint flows are also strengths. However, there are significant concerns regarding the attack surface. The plugin exposes two AJAX handlers without authentication checks, which could be exploited by unauthenticated users to trigger potentially sensitive actions or reveal information.

While the plugin has a history of one medium-severity Cross-site Scripting (XSS) vulnerability discovered in July 2023, the fact that it is currently unpatched in this version is a major red flag. This historical pattern of XSS, even if addressed in past versions, indicates a potential for improper input sanitization. The relatively low percentage of properly escaped outputs (67%) further reinforces this concern, suggesting that some output might still be vulnerable to XSS attacks. The plugin also has a limited number of entry points without proper authorization, which is generally good, but the two unprotected AJAX handlers are critical entry points for potential exploitation.

Key Concerns

  • Unprotected AJAX handlers
  • Medium severity vulnerability in history (unpatched)
  • Insufficient output escaping
Vulnerabilities
1

Client Portal : SuiteDash Direct Login Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2023-38476medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Client Portal : SuiteDash Direct Login <= 1.7.3 - Authenticated (Administrator+) Stored Cross-Site Scripting

Jul 20, 2023 Patched in 1.7.5 (187d)
Code Analysis
Analyzed Mar 16, 2026

Client Portal : SuiteDash Direct Login Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
35 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

67% escaped52 total outputs
Attack Surface
2 unprotected

Client Portal : SuiteDash Direct Login Attack Surface

Entry Points5
Unprotected2

AJAX Handlers 3

noprivwp_ajax_suitedash_requestsuitedash-login.php:53
authwp_ajax_suitedash_requestsuitedash-login.php:54
authwp_ajax_suitedash_request_check_statussuitedash-login.php:56

Shortcodes 2

[wp_suitedash_login] suitedash-login.php:43
[wp_suitedash_login_form] suitedash-login.php:45
WordPress Hooks 8
filterwp_nav_menu_objectssuitedash-login.php:47
actionwp_footersuitedash-login.php:49
actionload-nav-menus.phpsuitedash-login.php:59
filtermanage_nav-menus_columnssuitedash-login.php:60
actionadmin_initsuitedash-login.php:63
actionadmin_menusuitedash-login.php:64
actionadmin_enqueue_scriptssuitedash-login.php:66
filteroption_suitedash_loginsuitedash-login.php:69
Maintenance & Trust

Client Portal : SuiteDash Direct Login Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedNov 19, 2025
PHP min version
Downloads29K

Community Trust

Rating98/100
Number of ratings100
Active installs1K
Developer Profile

Client Portal : SuiteDash Direct Login Developer Profile

suitedash

1 plugin · 1K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
187 days
View full developer profile
Detection Fingerprints

How We Detect Client Portal : SuiteDash Direct Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/client-portal-suitedash-login/css/frontend.css/wp-content/plugins/client-portal-suitedash-login/css/frontend_responsive.css/wp-content/plugins/client-portal-suitedash-login/js/frontend.js
Script Paths
/wp-content/plugins/client-portal-suitedash-login/js/admin.colorpicker.js/wp-content/plugins/client-portal-suitedash-login/js/custom-media-selection.js
Version Parameters
client-portal-suitedash-login/css/frontend.css?ver=client-portal-suitedash-login/css/frontend_responsive.css?ver=client-portal-suitedash-login/js/frontend.js?ver=client-portal-suitedash-login/js/admin.colorpicker.js?ver=client-portal-suitedash-login/js/custom-media-selection.js?ver=

HTML / DOM Fingerprints

CSS Classes
sd-login-form-wrapsd-login-form-containersd-login-form-headersd-login-form-titlesd-login-form-wrappersd-login-formsd-login-form-input-wrapsd-login-form-input+4 more
Data Attributes
data-suitedash-login-url
JS Globals
wp_suitedash_login_params
REST Endpoints
/wp-json/suitedash-login/v1/check
Shortcode Output
[wp_suitedash_login][wp_suitedash_login_form]
FAQ

Frequently Asked Questions about Client Portal : SuiteDash Direct Login