WP Admin View Security & Risk Analysis

wordpress.org/plugins/wp-admin-view

WP Admin View plugin provide several options to customize WordPress Admin theme, elements & views.

0 active installs v1.0.0 PHP 5.2.4+ WP 4.6+ Updated Unknown
wp-admin-customizewp-admin-designwp-admin-themewp-admin-viewwp-admin
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Admin View Safe to Use in 2026?

Generally Safe

Score 100/100

WP Admin View has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "wp-admin-view" v1.0.0 plugin exhibits a mixed security posture. On one hand, it demonstrates good practices by using prepared statements for all SQL queries and has no recorded vulnerabilities. The static analysis also indicates a limited attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected. However, there are significant concerns regarding data handling and output sanitization.

The presence of 18 dangerous function calls, specifically `unserialize`, without clear context or sanitization in the taint analysis is a major red flag. Two unsanitized paths were identified in the taint analysis, indicating potential for data injection vulnerabilities. Furthermore, only 20% of output is properly escaped, suggesting a high risk of Cross-Site Scripting (XSS) vulnerabilities, especially considering the lack of specific details on how the data being processed by `unserialize` is validated or sanitized before output.

While the absence of historical vulnerabilities and unpatched CVEs is positive, it doesn't negate the risks identified in the current code analysis. The plugin's strengths lie in its limited attack surface and secure SQL handling. Its weaknesses are the identified potential for deserialization vulnerabilities and widespread output escaping issues. Therefore, while the plugin is not demonstrably compromised based on historical data, the static and taint analysis reveals significant potential for exploitation through insecure deserialization and XSS, requiring immediate attention.

Key Concerns

  • Dangerous function unserialize found (18 instances)
  • Taint flows with unsanitized paths (2 instances)
  • Low percentage of properly escaped output (20%)
  • External HTTP requests (potential for SSRF)
Vulnerabilities
None known

WP Admin View Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Admin View Code Analysis

Dangerous Functions
18
Raw SQL Queries
0
0 prepared
Unescaped Output
94
23 escaped
Nonce Checks
4
Capability Checks
6
File Operations
0
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$settings = unserialize($settings);includes\acmee-framework\inc\aof.class.php:194
unserialize$get_options = unserialize(get_site_option( $option_id ));includes\acmee-framework\inc\aof.class.php:251
unserialize$get_options = unserialize(get_option( $option_id ));includes\acmee-framework\inc\aof.class.php:259
unserialize$data = unserialize($import_data); //to avoid double serializationincludes\wpav-impexp.class.php:96
unserialize$wpav_options = (is_serialized(get_option(WPAV_OPTIONS_SLUG))) ? unserialize(get_option(WPAV_OPTIONSincludes\wpav-options.php:18
unserialize$wpav_options = (is_serialized(get_site_option(WPAV_OPTIONS_SLUG))) ? unserialize(get_site_option(WPincludes\wpav-options.php:21
unserialize$adminbar_items = (is_serialized(get_option(WPAV_ADMINBAR_LIST_SLUG))) ? unserialize(get_option(WPAVincludes\wpav-options.php:29
unserialize$adminbar_items = (is_serialized(get_site_option(WPAV_ADMINBAR_LIST_SLUG))) ? unserialize(get_site_oincludes\wpav-options.php:32
unserialize$admin_users_array = (is_serialized(get_option(WPAV_ADMIN_USERS_SLUG))) ? unserialize(get_option(WPAincludes\wpav-options.php:36
unserialize$dash_widgets_list = (is_serialized(get_option('wpav_widgets_list'))) ? unserialize(get_option('wpavincludes\wpav-options.php:51
unserialize$dash_widgets_list = (is_serialized(get_site_option('wpav_widgets_list'))) ? unserialize(get_site_opincludes\wpav-options.php:54
unserialize$admin_generaloptions = (is_serialized( $admin_general_options_data )) ? unserialize( $admin_generalincludes\wpav.class.php:171
unserialize$get_wpav_option_data = (is_serialized(get_option($option_id))) ? unserialize(get_option($option_id)includes\wpav.class.php:533
unserialize$get_wpav_option_data = (is_serialized(get_site_option($option_id))) ? unserialize(get_site_option($includes\wpav.class.php:536
unserialize$remove_dash_widgets = (is_serialized($dash_widgets_removal_data)) ? unserialize($dash_widgets_removincludes\wpav.class.php:668
unserialize$remove_dash_widgets = (is_serialized($dash_widgets_removal_data)) ? unserialize($dash_widgets_removincludes\wpav.class.php:697
unserialize$wpav_theme_data = unserialize(base64_decode($wpav_theme));includes\wpavthemes.class.php:47
unserialize$get_wpav_options_color = unserialize(base64_decode($wpav_themes[$selected_theme]));includes\wpavthemes.class.php:89

Output Escaping

20% escaped117 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

4 flows2 with unsanitized paths
wpav_settings_action (includes\wpav-impexp.class.php:86)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Admin View Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 51
actionafter_setup_themeincludes\acmee-framework\inc\aof.class.php:24
actionaof_tab_startincludes\acmee-framework\inc\aof.class.php:25
actionaof_tab_startincludes\acmee-framework\inc\aof.class.php:26
actionaof_tab_closeincludes\acmee-framework\inc\aof.class.php:27
actionaof_tab_closeincludes\acmee-framework\inc\aof.class.php:28
actionaof_after_headingincludes\acmee-framework\inc\aof.class.php:29
actionadmin_menuincludes\wpav-impexp.class.php:19
actionplugins_loadedincludes\wpav-impexp.class.php:20
actionadmin_menuincludes\wpav.class.php:25
actionwp_dashboard_setupincludes\wpav.class.php:26
filteradmin_titleincludes\wpav.class.php:28
actioninitincludes\wpav.class.php:29
actionadmin_bar_menuincludes\wpav.class.php:31
actionadmin_bar_menuincludes\wpav.class.php:32
actionadmin_bar_menuincludes\wpav.class.php:33
actionwp_dashboard_setupincludes\wpav.class.php:34
actionlogin_enqueue_scriptsincludes\wpav.class.php:37
actionlogin_headincludes\wpav.class.php:38
actionadmin_enqueue_scriptsincludes\wpav.class.php:40
actionadmin_headincludes\wpav.class.php:41
actionwp_before_admin_bar_renderincludes\wpav.class.php:42
filterlogin_headerurlincludes\wpav.class.php:43
filterlogin_headertitleincludes\wpav.class.php:44
actionadmin_headincludes\wpav.class.php:45
actionplugins_loadedincludes\wpav.class.php:47
actionlogin_footerincludes\wpav.class.php:48
actionwp_headincludes\wpav.class.php:50
actionactivated_pluginincludes\wpav.class.php:51
actionaof_before_headingincludes\wpav.class.php:52
filterlogin_titleincludes\wpav.class.php:53
filterautomatic_updater_disabledincludes\wpav.class.php:100
filterauto_core_update_send_emailincludes\wpav.class.php:103
filterwp_mail_fromincludes\wpav.class.php:106
filterwp_mail_from_nameincludes\wpav.class.php:107
filterscreen_options_show_screenincludes\wpav.class.php:178
filteradmin_footer_textincludes\wpav.class.php:189
filterupdate_footerincludes\wpav.class.php:191
actionadmin_headincludes\wpav.class.php:193
filtershow_admin_barincludes\wpav.class.php:782
actionadmin_initincludes\wpavmenu.class.php:20
actionadmin_headincludes\wpavmenu.class.php:21
actionadmin_menuincludes\wpavmenu.class.php:22
actionadmin_enqueue_scriptsincludes\wpavmenu.class.php:23
actionplugins_loadedincludes\wpavmenu.class.php:24
filterparent_fileincludes\wpavmenu.class.php:25
actionadmin_menuincludes\wpavthemes.class.php:16
actionplugins_loadedincludes\wpavthemes.class.php:17
actionplugins_loadedindex.php:80
actionadmin_enqueue_scriptsmain-settings.php:31
actionadmin_menumain-settings.php:48
actionadmin_menumain-settings.php:59
Maintenance & Trust

WP Admin View Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedUnknown
PHP min version5.2.4
Downloads999

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

WP Admin View Developer Profile

krishjohnson

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Admin View

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-admin-view/assets/css/custom.css/wp-content/plugins/wp-admin-view/assets/css/customizer.css/wp-content/plugins/wp-admin-view/assets/css/dashboard.css/wp-content/plugins/wp-admin-view/assets/css/login.css/wp-content/plugins/wp-admin-view/assets/css/responsive.css/wp-content/plugins/wp-admin-view/assets/font-awesome/css/font-awesome.min.css/wp-content/plugins/wp-admin-view/assets/js/admin-menu.js/wp-content/plugins/wp-admin-view/assets/js/customizer.js+8 more
Script Paths
admin-ajax.php?action=wpavLogincssassets/js/loginjs.jsassets/font-awesome/css/font-awesome.min.cssassets/js/wpav-livepreview.jsassets/js/wpav-options.js
Version Parameters
wp-admin-view/assets/font-awesome/css/font-awesome.min.css?ver=wp-admin-view/assets/js/loginjs.js?ver=wp-admin-view/assets/js/wpav-livepreview.js?ver=wp-admin-view/assets/js/wpav-options.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpav-kb-link
HTML Comments
<!-- AOF Constants --><!-- WPAV Version --><!-- WPAV Path Constant --><!-- WPAV URI Constant -->+10 more
Data Attributes
data-wpav-login-title
JS Globals
window.wpav_admin_menu_datawindow.wpav_options_datawindow.wpav_menu_order_datawindow.WPAV_DIR_URIwindow.WPAV_VERSION
FAQ

Frequently Asked Questions about WP Admin View