Login Dongle Security & Risk Analysis

wordpress.org/plugins/login-dongle

The bookmark to login nobody but you. Simple and secure.

60 active installs v1.5.2 PHP + WP 1.0+ Updated Oct 1, 2014
answerchallengeddosresponsesecurity-question
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Login Dongle Safe to Use in 2026?

Generally Safe

Score 85/100

Login Dongle has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The login-dongle plugin v1.5.2 exhibits a mixed security posture. On the positive side, there are no recorded vulnerabilities (CVEs) and the static analysis shows a complete absence of dangerous functions, external HTTP requests, and SQL queries that are not properly prepared. The attack surface appears minimal, with zero AJAX handlers, REST API routes, shortcodes, or cron events. This suggests a potentially lean and focused plugin. However, significant concerns arise from the code analysis. A critical finding is that 0% of the 17 detected output operations are properly escaped. This represents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data or dynamic content could be injected into the output without sanitization. Furthermore, the plugin performs file operations, and without explicit details on these operations and their associated checks, they represent a potential vector for unauthorized file access or modification. The lack of nonce checks and capability checks, combined with zero unprotected entry points, is confusing; it might indicate that the identified entry points are not intended for public interaction, or that the checks are implicitly handled elsewhere, but this lack of explicit checks is a weakness in clear security practice. The absence of taint analysis results is also noteworthy, as it could imply that the analysis tools were unable to identify any potential data flow issues, or that the plugin's structure did not trigger the analysis.

Key Concerns

  • Unescaped output detected
  • File operations present without clear checks
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Login Dongle Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Login Dongle Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped17 total outputs
Attack Surface

Login Dongle Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
filterwp_mail_content_typeLoginDongleMail.php:31
actiondelete_userLoginDonglePlugin.php:30
actionlogin_enqueue_scriptsLoginDonglePlugin.php:41
actionlogin_initLoginDonglePlugin.php:42
filterwp_xmlrpc_server_classLoginDonglePlugin.php:44
actionlogin_init_xmlrpcLoginDonglePlugin.php:45
actionadmin_menuLoginDongleSiteAdmin.php:22
actionadmin_initLoginDongleSiteAdmin.php:23
actionprofile_personal_optionsLoginDongleUserAdmin.php:21
actionedit_user_profileLoginDongleUserAdmin.php:24
actionprofile_updateLoginDongleUserAdmin.php:25
Maintenance & Trust

Login Dongle Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedOct 1, 2014
PHP min version
Downloads26K

Community Trust

Rating90/100
Number of ratings2
Active installs60
Developer Profile

Login Dongle Developer Profile

Andrea Ercolino

5 plugins · 480 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Login Dongle

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/login-dongle/js/login-dongle.js
Version Parameters
login-dongle/js/login-dongle.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- The bookmark to login nobody but you. Simple and secure. --><!-- TODO try to implement handleFormPOST and handleXmlrpcPOST by hooking into the the 'authenticate' filter (see http://core.trac.wordpress.org/ticket/20704) --><!-- just comment the following line if you need to temporarily disable this plugin --><!-- This binds events to handlers -->+23 more
JS Globals
LoginDongle
FAQ

Frequently Asked Questions about Login Dongle