EM Custom Login Security & Risk Analysis

wordpress.org/plugins/em-custom-login

Enables a completely customizable WordPress login, registration and password form.

10 active installs v0.1.5 PHP + WP 4.0+ Updated Jan 18, 2017
admincustom-loginloginpasswordregister
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is EM Custom Login Safe to Use in 2026?

Generally Safe

Score 85/100

EM Custom Login has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The em-custom-login plugin v0.1.5 exhibits a mixed security posture. While it demonstrates good practices by having no known vulnerabilities (CVEs) and generally implementing nonce and capability checks on its entry points, there are several areas of concern within the static analysis results. The most significant issue is the presence of SQL queries that are not using prepared statements. This lack of sanitization in database interactions can lead to SQL injection vulnerabilities if user-supplied data is directly incorporated into these queries. Additionally, a notable percentage of output is not properly escaped, creating a risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis also reveals flows with unsanitized paths, which, while not flagged as critical or high severity in this specific scan, warrants attention as it indicates potential pathways for malicious data to be processed without adequate cleaning. The plugin's vulnerability history is clean, which is a positive indicator of past development and maintenance, but it doesn't mitigate the risks identified in the current static analysis. In conclusion, while the plugin has a strong foundation with minimal known exploitable flaws and some security checks in place, the identified issues with SQL query preparation and output escaping, along with unsanitized data flows, present tangible security risks that need to be addressed.

Key Concerns

  • SQL queries not using prepared statements
  • Low percentage of properly escaped output
  • Flows with unsanitized paths found
  • File operations detected
Vulnerabilities
None known

EM Custom Login Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

EM Custom Login Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
29
9 escaped
Nonce Checks
3
Capability Checks
2
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

24% escaped38 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

6 flows3 with unsanitized paths
redirect_to_custom_password_reset (password.php:196)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

EM Custom Login Attack Surface

Entry Points5
Unprotected0

Shortcodes 5

[emcl-login-form] login.php:24
[emcl-forgot-password-form] password.php:26
[emcl-reset-password-form] password.php:27
[emcl-registration-form] register.php:22
[emcl-user-activation] user-activation.php:16
WordPress Hooks 25
actionadmin_menuadmin.php:18
actionadmin_noticesadmin.php:19
actionadmin_enqueue_scriptsadmin.php:20
actioninitadmin.php:21
actionwp_trash_postadmin.php:22
actionwp_enqueue_scriptsfunctions.php:12
actionafter_setup_themefunctions.php:259
actionwp_enqueue_scriptsfunctions.php:273
actioninitlogin.php:16
actioninitlogin.php:17
actionemcl_before_login-formlogin.php:18
actionwp_login_failedlogin.php:19
actionwp_logoutlogin.php:20
filterauthenticatelogin.php:22
actionemcl_before_forgot-passwordpassword.php:16
actionlogin_form_lostpasswordpassword.php:17
actionlogin_form_lostpasswordpassword.php:18
actionlogin_form_rppassword.php:19
actionlogin_form_resetpasspassword.php:20
actionlogin_form_rppassword.php:21
actionlogin_form_resetpasspassword.php:22
filterretrieve_password_messagepassword.php:24
actionemcl_before_register-formregister.php:18
actioninitregister.php:19
actionlogin_form_registerregister.php:20
Maintenance & Trust

EM Custom Login Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedJan 18, 2017
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Developer Profile

EM Custom Login Developer Profile

erikdmitchell

5 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect EM Custom Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/em-custom-login/css/admin.css/wp-content/plugins/em-custom-login/js/admin.js
Script Paths
/wp-content/plugins/em-custom-login/js/admin.js
Version Parameters
em-custom-login/css/admin.css?ver=em-custom-login/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
emcl-login-formemcl-registration-formemcl-forgot-password-formemcl-reset-password-formemcl-user-activation
Data Attributes
data-emcl-nonce
Shortcode Output
[emcl-login-form][emcl-registration-form][emcl-forgot-password-form][emcl-reset-password-form]
FAQ

Frequently Asked Questions about EM Custom Login