Om Change Login Design Security & Risk Analysis

wordpress.org/plugins/om-change-login-design

Change the wordpress admin design, You can upload your own site logo on that.

0 active installs v01.00.05 PHP + WP 5.8.0+ Updated May 8, 2022
admin-designadmin-login-designwordpress-admin-design
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Om Change Login Design Safe to Use in 2026?

Generally Safe

Score 85/100

Om Change Login Design has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "om-change-login-design" plugin v01.00.05 exhibits a generally good security posture based on the provided static analysis. The plugin has no known CVEs, indicating a history of secure development or prompt patching. Furthermore, the static analysis reveals a small attack surface with only one AJAX handler, and importantly, this entry point appears to be protected. The code signals also show positive signs, with no dangerous functions, SQL queries exclusively using prepared statements, and a proper nonce check present.

However, there are a couple of areas for concern that prevent a perfect score. A significant portion of output (20%) is not properly escaped, which could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is directly outputted without sanitization. Additionally, while a nonce check is present, the absence of capability checks on the single AJAX handler is a notable weakness. This means that any authenticated user, regardless of their role or permissions, could potentially trigger this AJAX action, which is a security risk. The taint analysis shows no concerning flows, and the lack of file operations or external HTTP requests further strengthens the perceived security.

In conclusion, the plugin has strong foundations in preventing common vulnerabilities like SQL injection and basic unauthorized access. The developers have made good choices regarding prepared statements and nonce checks. The primary areas of risk are the potential for unescaped output leading to XSS and the lack of role-based access control on the AJAX endpoint. Addressing these two points would significantly enhance the plugin's security.

Key Concerns

  • 20% of output not properly escaped
  • AJAX handler lacks capability checks
Vulnerabilities
None known

Om Change Login Design Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Om Change Login Design Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
8 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

80% escaped10 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
om_change_login_design_submit (admin\function\form_submit.php:3)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Om Change Login Design Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_om_change_login_admin_reponseadmin\function\form_submit.php:2
WordPress Hooks 12
actionadmin_enqueue_scriptsadmin\function\admin_function.php:2
actionlogin_enqueue_scriptsadmin\function\admin_function.php:3
actionadmin_menuadmin\function\admin_main_menu.php:10
actionadmin_enqueue_scriptsadmin\function\include_js_css.php:13
actionlogin_enqueue_scriptsincluding_js_css.php:4
actionlogin_enqueue_scriptsincluding_js_css.php:10
filterlogin_messageindex.php:16
actionlogin_enqueue_scriptsindex.php:17
filterlogin_headerurlindex.php:18
filterlogin_headertextindex.php:19
filterlogin_footerindex.php:20
filterplugin_action_linksindex.php:26
Maintenance & Trust

Om Change Login Design Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedMay 8, 2022
PHP min version
Downloads709

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Om Change Login Design Developer Profile

Er Siddharth Singh

5 plugins · 40 total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Om Change Login Design

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/om-change-login-design/admin/css/style.css/wp-content/plugins/om-change-login-design/bootstrap/css/bootstrap.min.css/wp-content/plugins/om-change-login-design/bootstrap/js/bootstrap.bundle.min.js/wp-content/plugins/om-change-login-design/admin/js/om_image_upload.js/wp-content/plugins/om-change-login-design/admin/js/om_login_design_script.js/wp-content/plugins/om-change-login-design/js/script.js/wp-content/plugins/om-change-login-design/css/style.css
Script Paths
js/script.js
Version Parameters
om-change-login-design/admin/css/style.css?ver=om-change-login-design/bootstrap/css/bootstrap.min.css?ver=om-change-login-design/bootstrap/js/bootstrap.bundle.min.js?ver=om-change-login-design/admin/js/om_image_upload.js?ver=om-change-login-design/admin/js/om_login_design_script.js?ver=om-change-login-design/js/script.js?ver=om-change-login-design/css/style.css?ver=

HTML / DOM Fingerprints

JS Globals
om_change_login_admin_script
FAQ

Frequently Asked Questions about Om Change Login Design