Smart Custom Login Security & Risk Analysis

wordpress.org/plugins/smart-custom-login

A nice custom login plugin

0 active installs v1.0.0 PHP + WP 4.0+ Updated May 5, 2017
custom-loginloginregister
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Smart Custom Login Safe to Use in 2026?

Generally Safe

Score 85/100

Smart Custom Login has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The 'smart-custom-login' v1.0.0 plugin exhibits a generally positive security posture based on the provided static analysis. It demonstrates good practices by avoiding dangerous functions, not performing file operations or external HTTP requests, and implementing at least one nonce check. Crucially, all detected SQL queries utilize prepared statements, which is a significant defense against SQL injection vulnerabilities.

However, there are areas of concern. The plugin has a relatively low output escaping rate at 46%, meaning a significant portion of its output is not properly sanitized. This could potentially lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is directly outputted without sufficient escaping.

The vulnerability history is completely clean, with no known CVEs recorded. This, combined with the absence of critical or high severity taint flows and the lack of raw SQL queries, suggests that the plugin has historically been secure and the developers may be diligent about security. Nonetheless, the potential for XSS due to insufficient output escaping remains the primary risk, especially as the plugin's attack surface, while small, is not explicitly protected by capability checks.

Key Concerns

  • Low output escaping rate
  • Missing capability checks on entry points
Vulnerabilities
None known

Smart Custom Login Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Smart Custom Login Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Smart Custom Login Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
6 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

46% escaped13 total outputs
Attack Surface

Smart Custom Login Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[scl-custom-login] main.php:21
Maintenance & Trust

Smart Custom Login Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.33
Last updatedMay 5, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Smart Custom Login Developer Profile

farvehandleren

12 plugins · 230 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Smart Custom Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/smart-custom-login/spr.js

HTML / DOM Fingerprints

CSS Classes
riquickContactsclwrapperloginsclwrapper regformerror
Data Attributes
id="loged_in_scl"id="user_login1"id="user_pass1"id="rememberme1"id="wp-submit1"id="message"+9 more
Shortcode Output
<div class="riquickContact"> <p> </p>
FAQ

Frequently Asked Questions about Smart Custom Login