
Om Change Login Design Security & Risk Analysis
wordpress.org/plugins/om-change-login-designChange the wordpress admin design, You can upload your own site logo on that.
Is Om Change Login Design Safe to Use in 2026?
Generally Safe
Score 85/100Om Change Login Design has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "om-change-login-design" plugin v01.00.05 exhibits a generally good security posture based on the provided static analysis. The plugin has no known CVEs, indicating a history of secure development or prompt patching. Furthermore, the static analysis reveals a small attack surface with only one AJAX handler, and importantly, this entry point appears to be protected. The code signals also show positive signs, with no dangerous functions, SQL queries exclusively using prepared statements, and a proper nonce check present.
However, there are a couple of areas for concern that prevent a perfect score. A significant portion of output (20%) is not properly escaped, which could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is directly outputted without sanitization. Additionally, while a nonce check is present, the absence of capability checks on the single AJAX handler is a notable weakness. This means that any authenticated user, regardless of their role or permissions, could potentially trigger this AJAX action, which is a security risk. The taint analysis shows no concerning flows, and the lack of file operations or external HTTP requests further strengthens the perceived security.
In conclusion, the plugin has strong foundations in preventing common vulnerabilities like SQL injection and basic unauthorized access. The developers have made good choices regarding prepared statements and nonce checks. The primary areas of risk are the potential for unescaped output leading to XSS and the lack of role-based access control on the AJAX endpoint. Addressing these two points would significantly enhance the plugin's security.
Key Concerns
- 20% of output not properly escaped
- AJAX handler lacks capability checks
Om Change Login Design Security Vulnerabilities
Om Change Login Design Code Analysis
Output Escaping
Data Flow Analysis
Om Change Login Design Attack Surface
AJAX Handlers 1
WordPress Hooks 12
Maintenance & Trust
Om Change Login Design Maintenance & Trust
Maintenance Signals
Community Trust
Om Change Login Design Alternatives
Om Change Login Design Developer Profile
5 plugins · 40 total installs
How We Detect Om Change Login Design
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/om-change-login-design/admin/css/style.css/wp-content/plugins/om-change-login-design/bootstrap/css/bootstrap.min.css/wp-content/plugins/om-change-login-design/bootstrap/js/bootstrap.bundle.min.js/wp-content/plugins/om-change-login-design/admin/js/om_image_upload.js/wp-content/plugins/om-change-login-design/admin/js/om_login_design_script.js/wp-content/plugins/om-change-login-design/js/script.js/wp-content/plugins/om-change-login-design/css/style.cssjs/script.jsom-change-login-design/admin/css/style.css?ver=om-change-login-design/bootstrap/css/bootstrap.min.css?ver=om-change-login-design/bootstrap/js/bootstrap.bundle.min.js?ver=om-change-login-design/admin/js/om_image_upload.js?ver=om-change-login-design/admin/js/om_login_design_script.js?ver=om-change-login-design/js/script.js?ver=om-change-login-design/css/style.css?ver=HTML / DOM Fingerprints
om_change_login_admin_script