Custom Admin Login Security & Risk Analysis

wordpress.org/plugins/custom-admin-login

Allows you to customize the background, logo, font color, url and caption on the WordPress login page.

70 active installs v1.0.8 PHP 5.6+ WP 5.2+ Updated May 27, 2022
adminbackgroundcustomloginlogo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Admin Login Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Admin Login has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The custom-admin-login plugin v1.0.8 exhibits a strong security posture in several key areas. Notably, it has no recorded vulnerabilities in its history, suggesting a well-maintained codebase or a low profile that hasn't attracted significant scrutiny. The absence of dangerous functions, SQL queries not using prepared statements, file operations, external HTTP requests, and no taint analysis issues further indicates careful development practices and a limited attack surface. The plugin also boasts zero AJAX handlers, REST API routes, shortcodes, and cron events, meaning there are no external entry points into the plugin's logic for attackers to exploit. This lack of direct interaction points is a significant security advantage.

However, a critical weakness is revealed in the output escaping analysis, where 100% of the 8 identified outputs are not properly escaped. This represents a significant risk of Cross-Site Scripting (XSS) vulnerabilities. If any user-supplied data is reflected directly into the plugin's output without sanitization, an attacker could inject malicious scripts. The absence of nonce and capability checks is also concerning, as it implies that even if there were entry points, they might not be adequately protected against unauthorized actions or privilege escalation. The lack of vulnerability history, while positive, could also mean it simply hasn't been thoroughly audited or targeted yet.

In conclusion, while the plugin demonstrates excellent control over its attack surface and avoids common dangerous coding practices, the critical flaw in output escaping and potential lack of authorization checks present a substantial risk. Addressing the XSS vulnerability through proper output escaping should be the highest priority, followed by implementing robust capability checks on any potential, albeit currently non-existent, entry points. The plugin's strengths lie in its limited interaction and clean core functions, but these are overshadowed by the identified output vulnerabilities.

Key Concerns

  • 100% of outputs are not properly escaped
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

Custom Admin Login Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Admin Login Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped8 total outputs
Attack Surface

Custom Admin Login Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionplugins_loadedincludes\class-textdomain.php:50
actionall_pluginsincludes\class-textdomain.php:53
actioncustomize_registerincludes\class-theme-customizer.php:54
filterlogin_headerurlincludes\class-theme-customizer.php:57
filterlogin_headertextincludes\class-theme-customizer.php:58
actionlogin_enqueue_scriptsincludes\class-theme-customizer.php:59
actionlogin_enqueue_scriptsincludes\class-theme-customizer.php:60
actionlogin_enqueue_scriptsincludes\class-theme-customizer.php:61
actionlogin_enqueue_scriptsincludes\class-theme-customizer.php:62
Maintenance & Trust

Custom Admin Login Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedMay 27, 2022
PHP min version5.6
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs70
Developer Profile

Custom Admin Login Developer Profile

Javier Prieto

1 plugin · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Admin Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-admin-login/includes/class-textdomain.php/wp-content/plugins/custom-admin-login/includes/class-theme-customizer.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Custom Admin Login