Logged in Security & Risk Analysis

wordpress.org/plugins/logged-in

Allows you to close your site to non-logged in users, by redirecting them to the login page, displaying a message or a specific template file.

10 active installs v1.0.4 PHP + WP 2.7+ Updated Apr 3, 2013
inlogloggedloginredirect
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Logged in Safe to Use in 2026?

Generally Safe

Score 85/100

Logged in has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "logged-in" plugin v1.0.4 exhibits a generally strong security posture based on the static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface. Furthermore, the code shows good practices by not utilizing dangerous functions, performing file operations, making external HTTP requests, or bundling libraries that could introduce vulnerabilities. All SQL queries are handled with prepared statements, which is excellent for preventing SQL injection.

However, a critical concern arises from the output escaping. With 100% of identified outputs not being properly escaped, this plugin presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic content rendered by this plugin could be exploited to inject malicious scripts into users' browsers. While the vulnerability history is clean, indicating a lack of past issues, this does not negate the immediate risk posed by the unescaped output.

In conclusion, the plugin demonstrates a robust foundation in preventing many common web vulnerabilities by limiting its entry points and securing its data interactions. The lack of historical vulnerabilities is positive. Nevertheless, the failure to escape output is a major oversight that could lead to severe security breaches, specifically XSS attacks. Addressing the output escaping is paramount to improving the plugin's overall security.

Key Concerns

  • Output not properly escaped
Vulnerabilities
None known

Logged in Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Logged in Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Logged in Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_initlogged-in.php:51
actionadmin_enqueue_scriptslogged-in.php:52
actioninitlogged-in.php:60
filterplugin_action_linkslogged-in.php:280
Maintenance & Trust

Logged in Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedApr 3, 2013
PHP min version
Downloads10K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

Logged in Developer Profile

Simon Fransson

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Logged in

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/logged-in/js/admin.js
Script Paths
/wp-content/plugins/logged-in/js/admin.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Logged in