Smithers Login Security & Risk Analysis

wordpress.org/plugins/smithers-login

Add style to your WordPress multisite login pages! This plugin enables you to specify a CSS to be used on the login page with a custom image/messages.

10 active installs v0.4 PHP + WP 3.0+ Updated Feb 22, 2011
admincssloginregistrationstyle
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Smithers Login Safe to Use in 2026?

Generally Safe

Score 85/100

Smithers Login has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The smithers-login plugin version 0.4 exhibits a generally positive security posture based on the static analysis, with no identified dangerous functions, file operations, or external HTTP requests. The use of prepared statements for all SQL queries is a significant strength, mitigating the risk of SQL injection. Furthermore, the plugin has no known historical vulnerabilities, suggesting a history of secure development or a lack of prior scrutiny.

However, there are notable areas of concern. The complete absence of nonce checks is a significant weakness, particularly if any of the plugin's functionalities were to be exposed through AJAX handlers (though none are currently identified). The fact that 100% of output is not properly escaped presents a high risk of Cross-Site Scripting (XSS) vulnerabilities, even if the current attack surface is small. The presence of a capability check without adequate context raises questions about its effectiveness in protecting sensitive operations. The limited analysis depth indicated by zero taint flows also means potential vulnerabilities could be missed.

In conclusion, while the plugin avoids common pitfalls like raw SQL and has a clean vulnerability history, the lack of output escaping and nonce checks are critical oversights that could lead to significant security breaches if the plugin's functionalities evolve or are utilized in unexpected ways. The small attack surface is currently a mitigating factor, but the underlying potential for XSS remains a serious concern.

Key Concerns

  • 100% of outputs are not properly escaped
  • No nonce checks present
  • Limited taint analysis depth
Vulnerabilities
None known

Smithers Login Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Smithers Login Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries

Output Escaping

0% escaped1 total outputs
Attack Surface

Smithers Login Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionadmin_menusmithers-login.php:110
actionlogin_headsmithers-login.php:113
filterlogin_headerurlsmithers-login.php:115
filterlogin_headertitlesmithers-login.php:117
actionlogin_headsmithers-login.php:119
filterlogin_messagesmithers-login.php:120
actionlogin_formsmithers-login.php:122
actionregister_formsmithers-login.php:124
actionlostpassword_formsmithers-login.php:126
Maintenance & Trust

Smithers Login Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedFeb 22, 2011
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Smithers Login Developer Profile

Travis Smith

11 plugins · 2K total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Smithers Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/smithers-login/smithers-login.css

HTML / DOM Fingerprints

CSS Classes
custom-login-messagecustom-logout-messagesl_pass_form_msg
FAQ

Frequently Asked Questions about Smithers Login