Login to read more Security & Risk Analysis

wordpress.org/plugins/login-to-read-more

Display content enclosed by the shortcode for registered users only.

30 active installs v0.2.0 PHP + WP 3.5+ Updated Jun 27, 2013
loginmemberpostregistershortcode
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Login to read more Safe to Use in 2026?

Generally Safe

Score 85/100

Login to read more has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "login-to-read-more" plugin, version 0.2.0, exhibits a generally good security posture based on the provided static analysis. The absence of dangerous functions, use of prepared statements for all SQL queries, and proper output escaping are commendable practices. The plugin also appears to have a very small attack surface, with no unprotected AJAX handlers or REST API routes, and no external HTTP requests or file operations. This suggests a developer who is mindful of common security pitfalls.

However, a significant concern arises from the complete lack of nonce and capability checks across all entry points, including its single shortcode. This means that any user, regardless of their role or authentication status, could potentially trigger the shortcode's functionality, which could lead to unintended consequences or be leveraged in more complex attacks if the shortcode's logic had any exploitable flaws. While taint analysis found no issues, this is likely due to the limited complexity and lack of user input processing in the current version.

The plugin's vulnerability history is entirely clean, with no recorded CVEs. This is a positive indicator, but coupled with the missing capability and nonce checks, it might suggest that the plugin is either very simple or has not been subjected to extensive security scrutiny or attack. The absence of these crucial checks is the most significant weakness identified and should be addressed to strengthen its security, even if no direct vulnerabilities have been discovered yet.

Key Concerns

  • Missing nonce checks on shortcode
  • Missing capability checks on shortcode
Vulnerabilities
None known

Login to read more Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Login to read more Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

Login to read more Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[auth] login-to-read-more.php:22
WordPress Hooks 1
actionplugins_loadedlogin-to-read-more.php:17
Maintenance & Trust

Login to read more Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedJun 27, 2013
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs30
Developer Profile

Login to read more Developer Profile

Takayuki Miyauchi

20 plugins · 41K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Login to read more

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
btnbtn-primarybtn-largebtn-readmore
Data Attributes
classhreftext
Shortcode Output
<a class="" href="">
FAQ

Frequently Asked Questions about Login to read more