Kaya Login Notification Security & Risk Analysis

wordpress.org/plugins/kaya-login-notification

Sends email notification on successful login, with fully customizable settings.

100 active installs v1.6.1 PHP 5.5+ WP 4.6.0+ Updated Dec 3, 2025
admin-login-notificationemail-notificationemail-notify-on-admin-loginloginlogin-notification
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Kaya Login Notification Safe to Use in 2026?

Generally Safe

Score 100/100

Kaya Login Notification has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The "kaya-login-notification" plugin, version 1.6.1, exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The absence of any known CVEs, including critical or high-severity ones, is a significant positive indicator. Furthermore, the code analysis reveals no dangerous functions, no external HTTP requests, and no file operations, all of which reduce the potential attack surface. The use of prepared statements for all SQL queries is also a best practice that mitigates SQL injection risks.

However, there are areas for improvement. A notable concern is the low percentage of properly escaped output (46%). This indicates a significant risk of Cross-Site Scripting (XSS) vulnerabilities, where user-supplied data might be rendered directly in the browser without adequate sanitization. The lack of nonce checks on the identified capability checks, while not directly tied to an attack surface component like AJAX or REST API, could potentially be exploited if an attacker can trick a logged-in user into performing an unintended action, depending on how these capability checks are implemented in relation to user actions. The absence of taint analysis results (0 flows analyzed) means that potential data flow vulnerabilities might have been missed.

In conclusion, while the plugin has avoided known vulnerabilities and implements some secure coding practices like prepared statements, the high proportion of unescaped output presents a clear and present danger. Addressing the output escaping is paramount for improving the plugin's overall security. The lack of taint analysis also suggests a need for more comprehensive security testing to uncover potential data flow issues.

Key Concerns

  • Low percentage of properly escaped output
  • No taint analysis results available
Vulnerabilities
None known

Kaya Login Notification Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Kaya Login Notification Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
52
45 escaped
Nonce Checks
0
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

46% escaped97 total outputs
Attack Surface

Kaya Login Notification Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedkaya-login-notification.php:60
actionwp_initialize_sitekaya-login-notification.php:90
actionplugins_loadedkaya-login-notification.php:111
filterplugin_action_linkskaya-login-notification.php:138
filterplugin_row_metakaya-login-notification.php:165
Maintenance & Trust

Kaya Login Notification Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 3, 2025
PHP min version5.5
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

Kaya Login Notification Developer Profile

Kaya Studio

3 plugins · 20K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
283 days
View full developer profile
Detection Fingerprints

How We Detect Kaya Login Notification

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Kaya Login Notification