WIP Custom Login Security & Risk Analysis

wordpress.org/plugins/wip-custom-login

WIP Custom Login allows you to customize the login section of WordPress and you can replace the admin WordPress logo, set a background image and much …

800 active installs v1.3.6 PHP + WP 3.5.0+ Updated Apr 23, 2025
custom-logincustomizationpluginsthemeswordpress-login
91
A · Safe
CVEs total2
Unpatched0
Last CVEMay 22, 2023
Safety Verdict

Is WIP Custom Login Safe to Use in 2026?

Generally Safe

Score 91/100

WIP Custom Login has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

2 known CVEsLast CVE: May 22, 2023Updated 1yr ago
Risk Assessment

The "wip-custom-login" v1.3.6 plugin exhibits a mixed security posture. On one hand, the static analysis reveals a small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected. The vast majority of output is properly escaped, and there are a reasonable number of nonce and capability checks in place. However, the presence of the `unserialize` function, especially without clear context on its usage and the source of serialized data, poses a significant concern. Additionally, the plugin's history of two medium-severity CVEs, specifically related to Cross-Site Request Forgery and Missing Authorization, indicates past implementation weaknesses that could potentially be exploited if similar coding errors are present in the current version, even if not immediately apparent in this static analysis.

While the current static analysis does not flag critical or high-severity issues in taint flows or critical SQL injection vulnerabilities, the historical vulnerability types (CSRF, Missing Authorization) are concerning. These often stem from insufficient validation of user input or improperly implemented authorization checks. The use of raw SQL queries without prepared statements is also a known risk factor for SQL injection, even if the current analysis shows only one query. The plugin's history suggests a pattern of these types of vulnerabilities, which warrants vigilance. The plugin's strengths lie in its limited attack surface and good output escaping, but the potential for serialized data misuse and past authorization/CSRF issues represent areas of ongoing risk.

Key Concerns

  • Presence of 'unserialize' function
  • SQL queries not using prepared statements
  • Past medium CVEs (CSRF, Missing Auth)
Vulnerabilities
2 published

WIP Custom Login Security Vulnerabilities

CVEs by Year

1 CVE in 2022
2022
1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2023-33313medium · 6.5Cross-Site Request Forgery (CSRF)

WIP Custom Login <= 1.2.9 - Cross-Site Request Forgery via save_option

May 22, 2023 Patched in 1.3.0 (246d)
CVE-2022-42884medium · 6.5Missing Authorization

WIP Custom Login <= 1.2.7 - Missing Authorization

Oct 24, 2022 Patched in 1.2.8 (456d)
Version History

WIP Custom Login Release Timeline

Code Analysis
Analyzed Mar 16, 2026

WIP Custom Login Code Analysis

Dangerous Functions
2
Raw SQL Queries
1
0 prepared
Unescaped Output
9
216 escaped
Nonce Checks
4
Capability Checks
1
File Operations
1
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$options = unserialize(file_get_contents($_FILES["wip_custom_login_upload_file"]["tmp_name"]));core\includes\class-panel.php:404
unserializeforeach (unserialize($option->option_value) as $k => $v) {core\includes\class-panel.php:410

SQL Query Safety

0% prepared1 total queries

Output Escaping

96% escaped225 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
wip_custom_login_panel (core\includes\class-panel.php:514)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WIP Custom Login Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionlogin_headertextcore\includes\class-custom-login.php:17
filterlogin_headerurlcore\includes\class-custom-login.php:18
actionlogin_enqueue_scriptscore\includes\class-custom-login.php:19
actionadmin_noticescore\includes\class-notice.php:19
actionadmin_headcore\includes\class-notice.php:20
actionadmin_menucore\includes\class-panel.php:20
actionadmin_initcore\includes\class-panel.php:21
actionadmin_initcore\includes\class-panel.php:22
actionplugins_loadedinit.php:44
actionlogin_enqueue_scriptsinit.php:45
Maintenance & Trust

WIP Custom Login Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 23, 2025
PHP min version
Downloads72K

Community Trust

Rating60/100
Number of ratings1
Active installs800
Developer Profile

WIP Custom Login Developer Profile

alexvtn

76 plugins · 10K total installs

76
trust score
Avg Security Score
95/100
Avg Patch Time
168 days
View full developer profile
Detection Fingerprints

How We Detect WIP Custom Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wip-custom-login/assets/js/custom.login.js/wp-content/plugins/wip-custom-login/assets/css/notice.css/wp-content/plugins/wip-custom-login/assets/css/panel.css/wp-content/plugins/wip-custom-login/assets/css/on_off.css/wp-content/plugins/wip-custom-login/assets/js/on_off.js/wp-content/plugins/wip-custom-login/assets/js/panel.js
Script Paths
//fonts.googleapis.com/css?family=Montserrat//fonts.googleapis.com/css?family=Source+Sans+Pro:300,300i,400,400i,600,600i,700,700i
Version Parameters
wip_custom_login_custom.loginWIP_custom_login_noticeWIP_custom_loginWIP_custom_login_on_offWIP_custom_login_googlefontsWIP_custom_login_on_off

HTML / DOM Fingerprints

CSS Classes
WIP_custom_login_messagewip_custom_login_settings_panel
Data Attributes
data-switch-label
JS Globals
wip_custom_login_setting
FAQ

Frequently Asked Questions about WIP Custom Login