Siris Login/Logout Redirect Security & Risk Analysis

wordpress.org/plugins/siris-loginlogout-redirect

Manage your users login and logout experience with this easy to use plugin.

10 active installs v1.0 PHP + WP 4.0+ Updated Dec 31, 2014
custom-logincustom-lougoutloginlogoutredirect
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Siris Login/Logout Redirect Safe to Use in 2026?

Generally Safe

Score 85/100

Siris Login/Logout Redirect has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The plugin "siris-loginlogout-redirect" v1.0 exhibits a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. This is a positive indicator of limited potential for direct exploitation through common WordPress entry points. The code analysis also shows a complete absence of dangerous functions and all SQL queries are properly prepared, mitigating risks related to direct database manipulation. Furthermore, there are no recorded vulnerabilities (CVEs) for this plugin, and no indications of taint analysis issues, suggesting a history of stable and secure code.

However, a significant concern arises from the output escaping. With 100% of outputs not being properly escaped, this plugin presents a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data displayed by the plugin could be injected with malicious scripts, which would then execute in the browser of other users. The lack of nonce and capability checks also suggests that functionalities, if any were present on the front-end or through less common entry points, might not be adequately protected against unauthorized actions.

In conclusion, while the plugin's limited attack surface and clean vulnerability history are strengths, the critical deficiency in output escaping creates a substantial security risk. The absence of capability checks further exacerbates this by potentially allowing unauthorized access or manipulation if any exploitable logic exists. The focus should be on addressing the XSS vulnerability urgently.

Key Concerns

  • Outputs are not properly escaped
  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

Siris Login/Logout Redirect Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Siris Login/Logout Redirect Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Attack Surface

Siris Login/Logout Redirect Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menuindex.php:13
actionadmin_enqueue_scriptsindex.php:14
actionlogin_redirectindex.php:15
filterauthenticateindex.php:16
filtershow_admin_barindex.php:17
filterwp_logoutindex.php:18
actionadmin_initindex.php:24
Maintenance & Trust

Siris Login/Logout Redirect Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedDec 31, 2014
PHP min version
Downloads2K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

Siris Login/Logout Redirect Developer Profile

Vamsi Pulavarthi

3 plugins · 520 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Siris Login/Logout Redirect

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/siris-loginlogout-redirect/addins/bootstrap.min.css

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Siris Login/Logout Redirect