Logged In As Security & Risk Analysis

wordpress.org/plugins/logged-in-as

Show the currently logged in user name and avatar

200 active installs v1.1.1 PHP 7.0+ WP 5.4+ Updated Dec 20, 2025
logged-inmemberpressmembersmembershipultimate-member
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Logged In As Safe to Use in 2026?

Generally Safe

Score 100/100

Logged In As has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The 'logged-in-as' plugin v1.1.1 exhibits a generally positive security posture based on the static analysis provided. The absence of any identified CVEs in its history and the lack of dangerous functions, file operations, external HTTP requests, and SQL queries (all using prepared statements) are strong indicators of secure coding practices. Furthermore, the plugin demonstrates a very limited attack surface with no identifiable entry points such as AJAX handlers, REST API routes, or shortcodes that lack authentication or permission checks.

However, a significant concern arises from the output escaping. With only 25% of outputs being properly escaped, this leaves a considerable portion vulnerable to potential cross-site scripting (XSS) attacks. While the taint analysis shows no explicit unsanitized flows, the lack of consistent output escaping is a weakness that could be exploited if data processed by the plugin is later rendered without proper sanitization elsewhere.

In conclusion, while the plugin is strong in preventing many common web vulnerabilities by design and has a clean vulnerability history, the poor output escaping is a notable weakness. This could potentially lead to XSS vulnerabilities, especially if user-supplied data is involved in the plugin's operations, even if not directly handled by the plugin's own entry points.

Key Concerns

  • Poor output escaping (only 25% proper)
Vulnerabilities
None known

Logged In As Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Logged In As Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

25% escaped8 total outputs
Attack Surface

Logged In As Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
filterwp_nav_menu_argsincludes\class-lia-action.php:22
filternav_menu_css_classincludes\class-lia-action.php:24
actioncheck_admin_refererincludes\class-lia-action.php:26
actionadmin_menuincludes\class-lia-options.php:35
actionadmin_initincludes\class-lia-options.php:38
filterplugin_action_linksincludes\class-lia-options.php:41
actionwp_enqueue_scriptsincludes\lia-css.php:8
actionplugins_loadedincludes\lia-css.php:9
Maintenance & Trust

Logged In As Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 20, 2025
PHP min version7.0
Downloads5K

Community Trust

Rating96/100
Number of ratings4
Active installs200
Developer Profile

Logged In As Developer Profile

jerrystewart99

3 plugins · 250 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Logged In As

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
logged-in-as/style.css?ver=logged-in-as_style

HTML / DOM Fingerprints

CSS Classes
liam-icon
FAQ

Frequently Asked Questions about Logged In As