
Login Dongle Security & Risk Analysis
wordpress.org/plugins/login-dongleThe bookmark to login nobody but you. Simple and secure.
Is Login Dongle Safe to Use in 2026?
Generally Safe
Score 85/100Login Dongle has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The login-dongle plugin v1.5.2 exhibits a mixed security posture. On the positive side, there are no recorded vulnerabilities (CVEs) and the static analysis shows a complete absence of dangerous functions, external HTTP requests, and SQL queries that are not properly prepared. The attack surface appears minimal, with zero AJAX handlers, REST API routes, shortcodes, or cron events. This suggests a potentially lean and focused plugin. However, significant concerns arise from the code analysis. A critical finding is that 0% of the 17 detected output operations are properly escaped. This represents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data or dynamic content could be injected into the output without sanitization. Furthermore, the plugin performs file operations, and without explicit details on these operations and their associated checks, they represent a potential vector for unauthorized file access or modification. The lack of nonce checks and capability checks, combined with zero unprotected entry points, is confusing; it might indicate that the identified entry points are not intended for public interaction, or that the checks are implicitly handled elsewhere, but this lack of explicit checks is a weakness in clear security practice. The absence of taint analysis results is also noteworthy, as it could imply that the analysis tools were unable to identify any potential data flow issues, or that the plugin's structure did not trigger the analysis.
Key Concerns
- Unescaped output detected
- File operations present without clear checks
- Missing nonce checks
- Missing capability checks
Login Dongle Security Vulnerabilities
Login Dongle Code Analysis
Output Escaping
Login Dongle Attack Surface
WordPress Hooks 11
Maintenance & Trust
Login Dongle Maintenance & Trust
Maintenance Signals
Community Trust
Login Dongle Alternatives
MB Challenge response authentication
mb-challenge-response-authentication
This plugin implements challenge response authentication. In addition, the WordPress hasher is replaced by native PHP libraries.
Cloudflare
cloudflare
All of Cloudflare’s performance and security benefits in a simple one-click install.
Disable XML-RPC Pingback
disable-xml-rpc-pingback
Stops abuse of your site's XML-RPC by simply removing some methods used by attackers. While you can use the rest of XML-RPC methods.
Stop XML-RPC Attacks
stop-xml-rpc-attacks
Blocks dangerous XML-RPC methods while preserving Jetpack, WooCommerce, and mobile apps compatibility.
Email marketing for WordPress by GetResponse Official
getresponse-official
Maximize visitor potential! Capture emails, automate marketing, track visits, and transfer ecommerce data to GetResponse for precision campaigns.
Login Dongle Developer Profile
5 plugins · 480 total installs
How We Detect Login Dongle
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/login-dongle/js/login-dongle.jslogin-dongle/js/login-dongle.js?ver=HTML / DOM Fingerprints
<!-- The bookmark to login nobody but you. Simple and secure. --><!-- TODO try to implement handleFormPOST and handleXmlrpcPOST by hooking into the the 'authenticate' filter (see http://core.trac.wordpress.org/ticket/20704) --><!-- just comment the following line if you need to temporarily disable this plugin --><!-- This binds events to handlers -->+23 moreLoginDongle