Custom Login Css Security & Risk Analysis

wordpress.org/plugins/custom-login-css

Adding the header and footer to your login page.

400 active installs v1.0.1 PHP + WP 4.9.4+ Updated Mar 24, 2018
custom-logincustom-pageheader-and-footerlogin-page
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Custom Login Css Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Login Css has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "custom-login-css" plugin, version 1.0.1, exhibits a generally good security posture based on the provided static analysis. The complete absence of identified AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code analysis did not reveal any dangerous functions, SQL queries without prepared statements, file operations, external HTTP requests, or bundled libraries, all of which are positive indicators. The taint analysis also reported no vulnerabilities found.

However, a critical concern arises from the complete lack of output escaping. With 100% of the identified output paths being unescaped, this opens the door for Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users, if not properly sanitized, could be manipulated to inject malicious scripts. Additionally, the absence of nonce and capability checks, while potentially justifiable given the limited attack surface, represents a missed opportunity to implement standard WordPress security practices that protect against CSRF attacks and unauthorized access.

The plugin's vulnerability history is clean, with no recorded CVEs. This, combined with the clean taint analysis, suggests a history of secure development. However, the significant risk introduced by unescaped output warrants careful consideration, as it's a common vector for exploitation. While the plugin appears robust in many areas, the lack of output escaping is a critical weakness that needs immediate attention.

Key Concerns

  • Output escaping missing
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Custom Login Css Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Login Css Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Custom Login Css Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionlogin_footerwp-custom-login.php:49
actionadmin_menuwp-custom-login.php:50
Maintenance & Trust

Custom Login Css Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMar 24, 2018
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings1
Active installs400
Developer Profile

Custom Login Css Developer Profile

GraphicEdit

7 plugins · 610 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Login Css

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Custom Login Css