Loginator Security & Risk Analysis

wordpress.org/plugins/loginator

Adds a simple global function for logging to files for developers.

0 active installs v2.0.1 PHP 5.4+ WP 4.0+ Updated Unknown
debugdeveloperdeveloper-toolerrorlogger
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Loginator Safe to Use in 2026?

Generally Safe

Score 100/100

Loginator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The Loginator v2.0.1 plugin exhibits a generally strong security posture based on the static analysis. The absence of any detected critical or high-severity taint flows, dangerous functions, or raw SQL queries is a significant positive. Furthermore, the plugin demonstrates good practices with its use of prepared statements for all SQL queries.

However, there are areas of concern. The complete lack of nonce checks and capability checks on its entry points, combined with 5 instances of file operations and 1 external HTTP request, presents a potential attack surface if these operations are not handled securely. The 60% rate of properly escaped output also indicates that 2 out of 5 outputs may be vulnerable to cross-site scripting (XSS) attacks.

The plugin's vulnerability history is clean, with no recorded CVEs, which is excellent. This, combined with the lack of critical findings in the static analysis, suggests that the development team is likely attentive to security. Nevertheless, the identified areas for improvement, particularly around authentication and output sanitization, warrant attention to maintain a robust security profile.

Key Concerns

  • No nonce checks on entry points
  • No capability checks on entry points
  • 40% of outputs not properly escaped
  • Presence of file operations
  • Presence of external HTTP requests
Vulnerabilities
None known

Loginator Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Loginator Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
5
External Requests
1
Bundled Libraries
0

Output Escaping

60% escaped5 total outputs
Attack Surface

Loginator Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionplugins_loadedloginator.php:158
actionadmin_noticesloginator.php:284
Maintenance & Trust

Loginator Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedUnknown
PHP min version5.4
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Loginator Developer Profile

Poly Plugins

9 plugins · 320 total installs

93
trust score
Avg Security Score
98/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Loginator

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/loginator/css/style.css
Version Parameters
/wp-content/plugins/loginator/css/style.css?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- Loginator Settings --><!-- Loginator Settings -->
Data Attributes
data-title="Reusable Admin Panel"
FAQ

Frequently Asked Questions about Loginator