Easy-to-use Security & Risk Analysis

wordpress.org/plugins/easy-to-use

Unmasks password inputs, enables 'remember-me' by default, sets login interval to 1 year.

10 active installs v2.0 PHP + WP 3.0+ Updated Aug 2, 2020
passwordrememberremembermeusabilityux
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Easy-to-use Safe to Use in 2026?

Generally Safe

Score 85/100

Easy-to-use has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "easy-to-use" v2.0 plugin exhibits a strong security posture based on the provided static analysis. The absence of any detected dangerous functions, raw SQL queries, unescaped output, file operations, or external HTTP requests is commendable. Furthermore, the plugin demonstrates excellent security practices by ensuring all (zero) SQL queries are prepared and all (zero) outputs are properly escaped. The taint analysis also reveals no critical or high severity flows with unsanitized paths, indicating a robust approach to preventing injection vulnerabilities.

However, the analysis also highlights significant areas of concern due to their complete absence. The lack of any detected entry points (AJAX handlers, REST API routes, shortcodes, cron events) is highly unusual for a functional plugin and suggests either an extremely simple or incomplete plugin. More importantly, the complete absence of nonce checks and capability checks, even on the declared zero entry points, is a notable weakness. While there are no entry points to exploit currently, if any were added without proper security checks, it would represent a critical oversight.

The vulnerability history shows a clean slate with no known CVEs, which is a positive indicator. This, combined with the static analysis results, suggests that the current codebase, as analyzed, is likely secure against common vulnerabilities. However, the lack of historical context or complexity in the plugin makes it difficult to definitively assess its long-term security resilience. The plugin's strength lies in its apparent lack of risky code, but its weakness lies in the complete absence of standard security mechanisms that would be expected even in a simple plugin.

Key Concerns

  • No Nonce Checks
  • No Capability Checks
  • Unusual lack of entry points
Vulnerabilities
None known

Easy-to-use Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Easy-to-use Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Easy-to-use Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionlogin_enqueue_scriptseasy-to-use.php:20
actionadmin_enqueue_scriptseasy-to-use.php:21
filterauth_cookie_expirationeasy-to-use.php:23
filterplugin_row_metaeasy-to-use.php:25
Maintenance & Trust

Easy-to-use Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedAug 2, 2020
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Developer Profile

Easy-to-use Developer Profile

webvitaly

14 plugins · 128K total installs

66
trust score
Avg Security Score
81/100
Avg Patch Time
396 days
View full developer profile
Detection Fingerprints

How We Detect Easy-to-use

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/easy-to-use/js/easy-to-use.js/wp-content/plugins/easy-to-use/css/easy-to-use.css
Script Paths
/wp-content/plugins/easy-to-use/js/easy-to-use.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Easy-to-use