
Setting up the WordPress login template Security & Risk Analysis
wordpress.org/plugins/formulario-de-logueoCustom Login plugin allows you to design some characteristics of the access login such as url of header, text of header, logo of header.
Is Setting up the WordPress login template Safe to Use in 2026?
Generally Safe
Score 85/100Setting up the WordPress login template has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin 'formulario-de-logueo' v1.3.7 exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points is a significant strength. Furthermore, the code signals are predominantly positive, with no dangerous functions, no raw SQL queries, and a very high percentage of properly escaped output. The plugin also avoids file operations and external HTTP requests, further reducing its attack surface. The taint analysis reveals no unsanitized paths, indicating a low risk of code injection or similar vulnerabilities.
However, a notable concern arises from the complete lack of nonce checks and capability checks. While the static analysis reports zero entry points, this absence of authorization mechanisms means that if any entry points were to be discovered or introduced in future versions, they would likely be unprotected. The vulnerability history also shows no recorded CVEs, which is excellent, but this, combined with the lack of explicit security checks, might suggest that the plugin has not been subjected to extensive security testing or has a very limited scope of functionality that hasn't historically attracted vulnerabilities.
In conclusion, 'formulario-de-logueo' v1.3.7 appears to be a secure plugin with a very small attack surface and robust handling of potential code execution risks. The primary weakness lies in the absence of fundamental security checks like nonces and capability checks, which could become a risk if the plugin's functionality or entry points expand in the future. Despite this, its current state and clean history suggest a low overall risk.
Key Concerns
- Missing nonce checks
- Missing capability checks
Setting up the WordPress login template Security Vulnerabilities
Setting up the WordPress login template Release Timeline
Setting up the WordPress login template Code Analysis
Output Escaping
Data Flow Analysis
Setting up the WordPress login template Attack Surface
Maintenance & Trust
Setting up the WordPress login template Maintenance & Trust
Maintenance Signals
Community Trust
Setting up the WordPress login template Alternatives
All In One Login — WP Admin Login Page Security and Customization with Google reCAPTCHA, Social Login, Limit Login Attempt, 2FA, and more.
change-wp-admin-login
Do you want to secure and customize the WordPress login page? Download the All in One Login plugin for login page security and customization.
Rename wp-admin login
rename-wp-admin-login
Rename wp-admin login* is a plugin that allows us to rename wp-admin login URL to anything you want
Disable User Login
wp-users-disable
The plug-in lists out all the existing users’ accounts and gives the ability to admin to disable specific user accounts via email address.
Unauthorised Login Redirect
unauthorised-login-redirect
This plugin allows you to effectively hide your wp-login.php and wp-admin by requiring that you access it via a custom URL.
WP Custom Login Branding
wp-custom-login-branding
A simple plugin that allows web developers and designers to brand the login page of WordPress for their customers.
Setting up the WordPress login template Developer Profile
1 plugin · 0 total installs
How We Detect Setting up the WordPress login template
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/formulario-de-logueo/libs/trait.model.php/wp-content/plugins/formulario-de-logueo/class.principal.phpformulario-de-logueo/libs/trait.model.php?ver=formulario-de-logueo/class.principal.php?ver=HTML / DOM Fingerprints
loginwebferrol-login-formSí intenta entrar desde la ruta sitio/wp-content/plugins/loginwebferrol.php
como no existe la constante sale del programadata-loginwebferrol-versionLOWF_VERSIONLOWF_ROOTFILE[loginwebferrol_form]