f(x) Login Notification Security & Risk Analysis

wordpress.org/plugins/fx-login-notification

Send notification via email when a user successfully logged-in in your site.

50 active installs v1.0.0 PHP + WP 4.0+ Updated Aug 1, 2016
commentsspam
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is f(x) Login Notification Safe to Use in 2026?

Generally Safe

Score 85/100

f(x) Login Notification has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The fx-login-notification plugin v1.0.0 exhibits an exceptionally clean security profile based on the provided static analysis and vulnerability history. There are no identified entry points that are unprotected, nor are there any dangerous functions, raw SQL queries, or file operations present. The code also demonstrates good practices with a high percentage of properly escaped outputs and no external HTTP requests. The absence of any recorded vulnerabilities or CVEs further strengthens this positive assessment.

While the plugin appears to be very secure, the complete lack of certain security mechanisms like nonce checks and capability checks, coupled with zero taint analysis results, might indicate a very simple plugin functionality. It's possible the plugin's scope is so limited that these checks are not deemed necessary or applicable. However, in a broader context, the absence of these fundamental security checks could become a concern if the plugin's functionality were to expand in the future.

In conclusion, based strictly on the data provided, fx-login-notification v1.0.0 is assessed as highly secure. Its strengths lie in its minimal attack surface, proper handling of SQL, and clean vulnerability history. The only area for potential, albeit minor, concern stems from the complete absence of nonce and capability checks, which, depending on the plugin's actual, unstated functionality, could represent a latent risk if the plugin were to evolve.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
Vulnerabilities
None known

f(x) Login Notification Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

f(x) Login Notification Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
28 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

93% escaped30 total outputs
Attack Surface

f(x) Login Notification Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionplugins_loadedfx-login-notification.php:42
actionwp_loginincludes\functions.php:211
actionadmin_menuincludes\settings.php:48
actionadmin_initincludes\settings.php:51
Maintenance & Trust

f(x) Login Notification Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedAug 1, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs50
Developer Profile

f(x) Login Notification Developer Profile

David Chandra Purnama

12 plugins · 2K total installs

82
trust score
Avg Security Score
83/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect f(x) Login Notification

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/fx-login-notification/assets/css/style.css/wp-content/plugins/fx-login-notification/assets/js/script.js
Script Paths
/wp-content/plugins/fx-login-notification/assets/js/script.js
Version Parameters
fx-login-notification/assets/css/style.css?ver=fx-login-notification/assets/js/script.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about f(x) Login Notification