Loggedin – Limit Concurrent Sessions Security & Risk Analysis

wordpress.org/plugins/loggedin

Lightweight plugin that limits an account to a specific number of concurrent logins.

8K active installs v2.0.4 PHP 7.4+ WP 5.0+ Updated Jan 2, 2026
limitloginlogoutsessionsuser-login
99
A · Safe
CVEs total1
Unpatched0
Last CVESep 30, 2024
Safety Verdict

Is Loggedin – Limit Concurrent Sessions Safe to Use in 2026?

Generally Safe

Score 99/100

Loggedin – Limit Concurrent Sessions has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Sep 30, 2024Updated 3mo ago
Risk Assessment

The "loggedin" v2.0.4 plugin exhibits a generally good security posture based on the static analysis. The complete absence of identified entry points like AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. The code also demonstrates strong adherence to security best practices, with all SQL queries utilizing prepared statements and a very high percentage of output being properly escaped. The presence of nonce and capability checks further enhances its security by protecting against common web vulnerabilities.

However, the plugin does have a history of vulnerabilities, specifically one medium-severity Cross-Site Scripting (XSS) vulnerability reported relatively recently. While this vulnerability is currently patched, it suggests that the plugin has had exploitable flaws in the past, indicating a potential for future issues if development practices are not consistently maintained at a high standard. The presence of the Freemius bundled library is noted but doesn't directly present a risk without further information on its specific version or known vulnerabilities.

In conclusion, the current version of the "loggedin" plugin appears secure based on the provided static analysis. The developers have implemented several key security features. The primary concern stems from the past vulnerability history, which warrants vigilance. A balance of strong current practices and awareness of past issues should guide its ongoing assessment.

Key Concerns

  • Past medium severity XSS vulnerability
  • Bundled Freemius library
Vulnerabilities
1

Loggedin – Limit Concurrent Sessions Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-9228medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Loggedin – Limit Active Logins <= 1.3.1 - Reflected Cross-Site Scripting

Sep 30, 2024 Patched in 1.3.2 (4d)
Code Analysis
Analyzed Mar 16, 2026

Loggedin – Limit Concurrent Sessions Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
40 escaped
Nonce Checks
4
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Freemius

Output Escaping

98% escaped41 total outputs
Attack Surface

Loggedin – Limit Concurrent Sessions Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionadmin_initincludes\class-addons.php:54
actionadmin_initincludes\class-addons.php:56
actionadmin_initincludes\class-addons.php:58
filterloggedin_admin_page_varsincludes\class-addons.php:60
actionadmin_menuincludes\class-admin.php:38
actionadmin_initincludes\class-admin.php:39
actionadmin_initincludes\class-admin.php:40
actionadmin_initincludes\class-admin.php:43
actionadmin_noticesincludes\class-admin.php:46
actionadmin_initincludes\class-admin.php:47
filterwp_authenticate_userincludes\class-core.php:39
filtercheck_passwordincludes\class-core.php:41
actionplugins_loadedloggedin.php:81
Maintenance & Trust

Loggedin – Limit Concurrent Sessions Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 2, 2026
PHP min version7.4
Downloads116K

Community Trust

Rating98/100
Number of ratings110
Active installs8K
Developer Profile

Loggedin – Limit Concurrent Sessions Developer Profile

Joel James

7 plugins · 117K total installs

76
trust score
Avg Security Score
95/100
Avg Patch Time
1175 days
View full developer profile
Detection Fingerprints

How We Detect Loggedin – Limit Concurrent Sessions

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/loggedin/assets/css/loggedin.css/wp-content/plugins/loggedin/assets/js/loggedin.js/wp-content/plugins/loggedin/assets/js/admin.js
Script Paths
/wp-content/plugins/loggedin/assets/js/loggedin.js/wp-content/plugins/loggedin/assets/js/admin.js
Version Parameters
loggedin/assets/css/loggedin.css?ver=loggedin/assets/js/loggedin.js?ver=loggedin/assets/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
loggedin-settings-pageloggedin-support-pageloggedin-addons-page
HTML Comments
<!-- Main plugin header. --><!-- Info page template. --><!-- Admin side functionality of the plugin. -->
Data Attributes
data-loggedin-actiondata-loggedin-user-id
JS Globals
loggedin_vars
FAQ

Frequently Asked Questions about Loggedin – Limit Concurrent Sessions