KGR Cookie Duration Security & Risk Analysis

wordpress.org/plugins/kgr-cookie-duration

Filters the authentication cookie duration.

0 active installs v1.1 PHP 7.0+ WP 3.5.0+ Updated Nov 18, 2024
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is KGR Cookie Duration Safe to Use in 2026?

Generally Safe

Score 92/100

KGR Cookie Duration has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "kgr-cookie-duration" v1.1 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the potential attack surface. Furthermore, the code demonstrates good practices with 100% of SQL queries using prepared statements and the presence of at least one capability check, which is a positive sign for access control. The lack of dangerous functions, file operations, and external HTTP requests further reduces common attack vectors.

However, there are areas for improvement. The output escaping is only 60% proper, meaning 40% of outputs are potentially vulnerable to cross-site scripting (XSS) if the data being output is user-controlled or untrusted. The complete absence of nonce checks and taint analysis results, while possibly indicating no exploitable issues were found, also means there's no direct evidence of robust input validation or sanitization for potential vulnerabilities. The vulnerability history is clean, which is excellent, but this doesn't negate the need for vigilance in code practices.

In conclusion, the plugin has a solid foundation with a minimal attack surface and good SQL handling. The primary concern lies with the incomplete output escaping, which poses a potential XSS risk. The lack of detected taint flows and zero known CVEs are positive indicators, but the plugin could benefit from more comprehensive input validation and sanitization measures, even if no immediate critical issues are apparent in the current analysis.

Key Concerns

  • Output escaping is not fully implemented (40% unescaped)
Vulnerabilities
None known

KGR Cookie Duration Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

KGR Cookie Duration Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
3 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

60% escaped5 total outputs
Attack Surface

KGR Cookie Duration Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitindex.php:24
filterplugin_action_linksindex.php:28
actionadmin_initindex.php:38
filterauth_cookie_expirationindex.php:76
Maintenance & Trust

KGR Cookie Duration Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 18, 2024
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Alternatives

KGR Cookie Duration Alternatives

No alternatives data available yet.

Developer Profile

KGR Cookie Duration Developer Profile

Konstantinos Raktivan

4 plugins · 60 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect KGR Cookie Duration

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
small-text
Data Attributes
id="kgr-cookie-duration-short"name="kgr-cookie-duration-short"id="kgr-cookie-duration-long"name="kgr-cookie-duration-long"label_for="kgr-cookie-duration-short"label_for="kgr-cookie-duration-long"
FAQ

Frequently Asked Questions about KGR Cookie Duration