WP AdminTools Security & Risk Analysis

wordpress.org/plugins/wp-admintools

Control additional Wordpress, SEO and Database features with this swiss army knife for WordPress.

100 active installs v1.3.9 PHP + WP 3.3+ Updated Apr 17, 2015
cleandatabasesearch-enginesecureseo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP AdminTools Safe to Use in 2026?

Generally Safe

Score 85/100

WP AdminTools has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "wp-admintools" plugin version 1.3.9 exhibits a generally good security posture with no recorded vulnerabilities in its history. The static analysis shows no identified CVEs, and the code demonstrates strong practices in areas like SQL query preparation, with all queries utilizing prepared statements. Furthermore, the plugin avoids external HTTP requests and file operations, reducing potential attack vectors. The presence of nonce and capability checks, although modest in number, indicates an awareness of WordPress security mechanisms.

However, a significant concern arises from the use of the `create_function` PHP function, which is considered deprecated and insecure due to its inherent risks of code injection if not handled with extreme caution. While the taint analysis did not reveal any unsanitized paths, the mere presence of `create_function` is a red flag. Additionally, the static analysis highlights a severe deficiency in output escaping, with only 1% of outputs being properly escaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website's content or administration area.

In conclusion, while "wp-admintools" benefits from a clean vulnerability history and secure SQL handling, the critical issues of extensive unescaped output and the use of `create_function` introduce significant security risks. Addressing these specific coding practices is paramount to improving the plugin's overall security and preventing potential XSS and code execution vulnerabilities.

Key Concerns

  • Extensive unescaped output (99%)
  • Use of dangerous function: create_function
Vulnerabilities
None known

WP AdminTools Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP AdminTools Release Timeline

v1.3.9Current
v1.3.8
v1.3.7
v1.3.6
v1.3.5
v1.3.4
v1.3.3
v1.3.2
v1.3.1
v1.3
v1.2
Code Analysis
Analyzed Mar 16, 2026

WP AdminTools Code Analysis

Dangerous Functions
4
Raw SQL Queries
0
12 prepared
Unescaped Output
138
2 escaped
Nonce Checks
7
Capability Checks
7
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_filter( 'login_headerurl', create_function(false,"return get_bloginfo( 'siteurl' );"));wp-admintools.php:1025
create_functionadd_filter( 'login_headertitle', create_function(false,"return get_bloginfo( 'siteurl' );"));wp-admintools.php:1026
create_functionadd_filter( 'login_headerurl', create_function(false,"return '#';"));wp-admintools.php:1028
create_functionadd_filter( 'login_headertitle', create_function(false,"return '';"));wp-admintools.php:1029

SQL Query Safety

100% prepared12 total queries

Output Escaping

1% escaped140 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
sisat_options (wp-admintools.php:440)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP AdminTools Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 20
actioninitwp-admintools.php:37
actionadmin_initwp-admintools.php:39
actionwpmu_new_blogwp-admintools.php:119
filterplugin_action_linkswp-admintools.php:220
actionadmin_menuwp-admintools.php:260
actionsave_postwp-admintools.php:261
actionsave_postwp-admintools.php:262
actionadmin_menuwp-admintools.php:418
actionadmin_initwp-admintools.php:419
actionwp_dashboard_setupwp-admintools.php:975
actionplugins_loadedwp-admintools.php:1011
filterlogin_headerurlwp-admintools.php:1025
filterlogin_headertitlewp-admintools.php:1026
filterlogin_headerurlwp-admintools.php:1028
filterlogin_headertitlewp-admintools.php:1029
filterpre_get_postswp-admintools.php:1033
actionwp_headwp-admintools.php:1115
actioninitwp-admintools.php:1213
actioninitwp-admintools.php:1274
filterrobots_txtwp-admintools.php:1292
Maintenance & Trust

WP AdminTools Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedApr 17, 2015
PHP min version
Downloads13K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

WP AdminTools Developer Profile

Stefan Seibel

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP AdminTools

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-admintools/css/style.css/wp-content/plugins/wp-admintools/css/style.min.css
Script Paths
/wp-content/plugins/wp-admintools/js/script.js/wp-content/plugins/wp-admintools/js/script.min.js
Version Parameters
wp-admintools/style.css?ver=wp-admintools/script.js?ver=

HTML / DOM Fingerprints

JS Globals
window.sisat_settings
FAQ

Frequently Asked Questions about WP AdminTools