wp-admin classic Security & Risk Analysis

wordpress.org/plugins/wp-admin-classic

Classic WordPress Admin theme (prior 3.8 style).

20 active installs v1.0.8 PHP + WP 3.8+ Updated Jan 4, 2014
adminclassiclegacytheme
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is wp-admin classic Safe to Use in 2026?

Generally Safe

Score 85/100

wp-admin classic has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "wp-admin-classic" v1.0.8 plugin demonstrates a strong security posture based on the provided static analysis and vulnerability history. The absence of any identified attack surface points, dangerous functions, or critical taint flows is highly positive. The code also shows good practices, with 100% of SQL queries utilizing prepared statements and a single capability check present, indicating an attempt to secure administrative functions. The plugin has no recorded vulnerability history, including CVEs, which suggests a stable and well-maintained codebase.

However, there are areas for improvement that introduce minor risks. A significant portion of the output (33%) is not properly escaped, which could lead to Cross-Site Scripting (XSS) vulnerabilities if the unescaped output contains user-supplied data. Furthermore, the complete lack of nonce checks, while not directly indicated as an issue due to the absence of AJAX handlers, is a general best practice for preventing Cross-Site Request Forgery (CSRF) in WordPress plugins. The plugin's minimal attack surface and lack of critical findings are strengths, but the unescaped output represents a tangible, albeit potentially low-impact, risk.

Key Concerns

  • Unescaped output detected
  • No nonce checks implemented
Vulnerabilities
None known

wp-admin classic Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

wp-admin classic Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped3 total outputs
Attack Surface

wp-admin classic Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionadmin_enqueue_scriptswpadmin-classic.php:17
actionadmin_enqueue_scriptswpadmin-classic.php:18
actionadmin_enqueue_scriptswpadmin-classic.php:21
actionwp_enqueue_scriptswpadmin-classic.php:22
actionadmin_footerwpadmin-classic.php:25
actionshow_user_profilewpadmin-classic.php:31
actionedit_user_profilewpadmin-classic.php:32
actionpersonal_options_updatewpadmin-classic.php:33
actionedit_user_profile_updatewpadmin-classic.php:34
Maintenance & Trust

wp-admin classic Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedJan 4, 2014
PHP min version
Downloads6K

Community Trust

Rating96/100
Number of ratings32
Active installs20
Developer Profile

wp-admin classic Developer Profile

mch0lic

3 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect wp-admin classic

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-admin-classic/wp-admin-css/wp-admin.min.css/wp-content/plugins/wp-admin-classic/wp-admin-css/ie.min.css/wp-content/plugins/wp-admin-classic/wp-includes-css/buttons.min.css/wp-content/plugins/wp-admin-classic/wp-admin-css/colors-classic.min.css/wp-content/plugins/wp-admin-classic/wp-admin-css/colors-fresh.min.css/wp-content/plugins/wp-admin-classic/wp-includes-css/editor.min.css/wp-content/plugins/wp-admin-classic/wp-admin-css/media.min.css/wp-content/plugins/wp-admin-classic/wp-includes-css/media-views.min.css+1 more

HTML / DOM Fingerprints

Shortcode Output
<select name="wp_admin_class_color_scheme" id="wp_admin_class_color_scheme">
FAQ

Frequently Asked Questions about wp-admin classic