LogingPower Security & Risk Analysis

wordpress.org/plugins/logingpower

Loging Power has been equipped with the feature in tabs, according to the parts of the login page, for each level of users.

0 active installs v1.2.3 PHP 5.3+ WP 6.7+ Updated Dec 18, 2025
custom-loginloginlogin-pagewordpress-loginwp-login
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is LogingPower Safe to Use in 2026?

Generally Safe

Score 100/100

LogingPower has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The plugin 'logingpower' v1.2.3 exhibits a strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the code demonstrates excellent security practices with 100% of SQL queries utilizing prepared statements and 99% of output properly escaped. The presence of nonce checks, even with no capability checks directly identified on entry points, is a positive indicator. The lack of recorded vulnerabilities, including CVEs, further reinforces its current secure state.

However, the analysis does reveal some potential areas for improvement and future scrutiny. The fact that there are zero taint flows analyzed and zero flows with unsanitized paths, while seemingly positive, could also indicate that the analysis itself might have been limited in scope or unable to fully trace all potential data flows within the plugin. The absence of capability checks on identified entry points (although there are no identified entry points to check) is a general good practice that is not explicitly demonstrated in this plugin's current structure. While the current version appears secure, a comprehensive security assessment often benefits from dynamic analysis and deeper taint analysis to uncover potential vulnerabilities that static analysis might miss.

In conclusion, 'logingpower' v1.2.3 appears to be a very secure plugin, with a strong emphasis on preventing common web vulnerabilities like SQL injection and XSS. Its minimal attack surface and diligent use of prepared statements and output escaping are commendable. The vulnerability history further suggests a well-maintained and secure codebase. The only minor concern is the potential limitation of the static analysis's depth in fully exploring all data flows, which is a general observation rather than a specific flaw in the plugin itself. Continuous monitoring and updates remain crucial for any software.

Vulnerabilities
None known

LogingPower Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

LogingPower Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
615 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

99% escaped623 total outputs
Attack Surface

LogingPower Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 23
filtergettextincludes\login_form.php:111
actionlogin_enqueue_scriptsincludes\login_form.php:127
filtergettextincludes\login_languageswitcher.php:83
actionlogin_enqueue_scriptsincludes\login_languageswitcher.php:85
actionlogin_enqueue_scriptsincludes\login_logo.php:30
filterlogin_headertextincludes\login_logo.php:39
filterlogin_headerurlincludes\login_logo.php:47
filtergettextincludes\login_lostpassword.php:19
actionlogin_enqueue_scriptsincludes\login_lostpassword.php:27
actionlogin_enqueue_scriptsincludes\login_message.php:30
actionlogin_enqueue_scriptsincludes\login_page.php:43
actionlogin_enqueue_scriptsincludes\login_section.php:108
actionplugins_loadedlogingpower.php:81
actionadmin_enqueue_scriptslogingpower.php:82
actionadmin_enqueue_scriptslogingpower.php:83
actionplugins_loadedlogingpower.php:85
actionadmin_initlogingpower.php:87
actionadmin_menulogingpower.php:99
actionadmin_enqueue_scriptslogingpower.php:114
actionadmin_enqueue_scriptslogingpower.php:115
actionlogin_enqueue_scriptslogingpower.php:1600
actionlogin_enqueue_scriptslogingpower.php:1607
actionlogin_headlogingpower.php:1638
Maintenance & Trust

LogingPower Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 18, 2025
PHP min version5.3
Downloads2K

Community Trust

Rating100/100
Number of ratings3
Active installs0
Developer Profile

LogingPower Developer Profile

Muhammad Ijaz Anjum

2 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect LogingPower

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/logingpower/assets/styles/interface.css/wp-content/plugins/logingpower/assets/styles/logingpower_tabs.css/wp-content/plugins/logingpower/assets/scripts/logingpower_ColorPicker.js/wp-content/plugins/logingpower/assets/scripts/tab_script.js
Script Paths
https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css
Version Parameters
logingpower/assets/styles/interface.css?ver=logingpower/assets/styles/logingpower_tabs.css?ver=logingpower/assets/scripts/logingpower_ColorPicker.js?ver=logingpower/assets/scripts/tab_script.js?ver=

HTML / DOM Fingerprints

CSS Classes
tablinkinterface_img
Data Attributes
onclick="openTab('Login'onclick="openTab('Loginsection'onclick="openTab('Loginlogo'onclick="openTab('Loginmessage'onclick="openTab('Loginform'onclick="openTab('Lostpassword'+3 more
FAQ

Frequently Asked Questions about LogingPower