Always Remember Me Security & Risk Analysis

wordpress.org/plugins/always-remember-me

Always checked 'Remember Me' checkbox and longer auth cookie expiration. Your blog will remember you.

200 active installs v1.0 PHP 5.6+ WP 3.0+ Updated Jun 7, 2020
checkboxcookieloginozhremember
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Always Remember Me Safe to Use in 2026?

Generally Safe

Score 85/100

Always Remember Me has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The 'always-remember-me' plugin v1.0 exhibits a strong security posture based on the provided static analysis and vulnerability history. There are no identified CVEs, no dangerous functions, no SQL queries that are not prepared, and no file operations or external HTTP requests. The absence of any taint analysis findings further reinforces this positive assessment. The plugin also scores well on its limited attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events being directly exposed. This suggests a well-written and security-conscious plugin.

However, a significant concern arises from the output escaping analysis. With one total output identified and 0% properly escaped, this presents a clear and present risk. If this single output is user-controllable data, it could lead to cross-site scripting (XSS) vulnerabilities. Additionally, the complete lack of nonce checks and capability checks across all potential entry points, though currently zero, indicates a potential weakness if any new entry points are introduced in future versions without proper security measures. While the current state is clean, the lack of fundamental security checks in the code itself is a notable oversight.

In conclusion, the 'always-remember-me' plugin v1.0 is currently very secure due to its limited functionality, clean vulnerability history, and absence of critical code flaws. However, the unescaped output represents a significant vulnerability that must be addressed to mitigate XSS risks. The absence of any capability or nonce checks also indicates a lack of defensive programming that could become problematic if the plugin's attack surface grows.

Key Concerns

  • 0% output escaping
Vulnerabilities
None known

Always Remember Me Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Always Remember Me Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Always Remember Me Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterlogin_footerplugin.php:16
filterauth_cookie_expirationplugin.php:17
actioninitplugin.php:19
Maintenance & Trust

Always Remember Me Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedJun 7, 2020
PHP min version5.6
Downloads6K

Community Trust

Rating100/100
Number of ratings2
Active installs200
Developer Profile

Always Remember Me Developer Profile

Ozh

27 plugins · 5K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Always Remember Me

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<script> document.getElementById('rememberme').checked = true; document.getElementById('user_login').focus(); </script>
FAQ

Frequently Asked Questions about Always Remember Me