Admin Users Logged In Security & Risk Analysis

wordpress.org/plugins/admin-users-logged-in

Dashboard widget that shows admin users and when they were last logged in.

100 active installs v1.0.6 PHP 7.0+ WP 4.4+ Updated Jan 10, 2026
admin-usersdashboard-widgetlast-login
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Admin Users Logged In Safe to Use in 2026?

Generally Safe

Score 100/100

Admin Users Logged In has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "admin-users-logged-in" plugin v1.0.6 exhibits a strong security posture based on the provided static analysis. The complete absence of an attack surface, including AJAX handlers, REST API routes, shortcodes, and cron events, significantly reduces the potential entry points for attackers. Furthermore, the code demonstrates good security practices by utilizing prepared statements for all SQL queries and properly escaping all output. The lack of dangerous function calls, file operations, external HTTP requests, and bundled libraries further solidifies this positive assessment.

The plugin's vulnerability history is also a positive indicator, with no recorded CVEs, suggesting a history of secure development. The taint analysis showing zero flows with unsanitized paths reinforces the confidence in the code's safety. The only area that warrants a minor consideration is the absence of nonce and capability checks. While the plugin has no exposed entry points that would typically require these, it's a best practice to include them for any code that could potentially be interacted with, even if indirectly.

In conclusion, the "admin-users-logged-in" plugin appears to be very secure. Its minimal attack surface and adherence to secure coding practices for SQL and output handling are commendable. The lack of historical vulnerabilities is a strong testament to its robustness. The only potential improvement would be the inclusion of nonce and capability checks as a general security best practice, though currently, there is no direct evidence of a risk due to their absence.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Admin Users Logged In Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Admin Users Logged In Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
0
10 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

100% escaped10 total outputs
Attack Surface

Admin Users Logged In Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_dashboard_setupadmin-users-logged-in.php:150
actionadmin_initadmin-users-logged-in.php:166
actionadmin_initadmin-users-logged-in.php:179
Maintenance & Trust

Admin Users Logged In Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 10, 2026
PHP min version7.0
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Admin Users Logged In Developer Profile

Marcel Pol

18 plugins · 82K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
1119 days
View full developer profile
Detection Fingerprints

How We Detect Admin Users Logged In

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
auli-dashboardauli-authorauli-date
HTML Comments
<!-- Plugin Name: Admin Users Logged In --><!-- Description: Dashboard widget that shows admin users and when they were last logged in. --><!-- Copyright 2018 - 2024 Marcel Pol (marcel@timelord.nl) --><!-- This program is free software; you can redistribute it and/or modify -->+13 more
Data Attributes
id="auli_<?php echo esc_html( $user->ID ); ?>"
FAQ

Frequently Asked Questions about Admin Users Logged In