Loginpetze Security & Risk Analysis

wordpress.org/plugins/loginpetze

Notifies the admin by email as soon as a user has successfully logged in. The mails are customizable, the plugin is completely translatable.

80 active installs v1.4 PHP 5.5+ WP 4.7+ Updated Dec 9, 2025
alertloginmonitornotificationstaging
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Loginpetze Safe to Use in 2026?

Generally Safe

Score 100/100

Loginpetze has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The plugin 'loginpetze' v1.4 exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of any recorded CVEs and the clean static analysis report, which shows no dangerous functions, unsanitized taint flows, or raw SQL queries, are significant strengths. Furthermore, the plugin demonstrates good practices by properly escaping the vast majority of its outputs and implementing capability checks. The lack of any identified attack surface points, such as unprotected AJAX handlers, REST API routes, or shortcodes, indicates a well-contained plugin with limited direct interaction points for attackers. However, the complete absence of nonce checks across all entry points is a notable concern. While the plugin may currently have no exploitable vulnerabilities, a lack of nonce checks can make it susceptible to Cross-Site Request Forgery (CSRF) attacks if any new functionalities are introduced or if existing ones, even those with capability checks, are not robustly protected against unexpected requests. The plugin's vulnerability history is excellent, but this does not negate the potential for future issues arising from the identified lack of nonce protection. In conclusion, 'loginpetze' v1.4 is generally secure, but the omission of nonce checks represents a potential weakness that should be addressed.

Key Concerns

  • Missing nonce checks on entry points
Vulnerabilities
None known

Loginpetze Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Loginpetze Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
1
24 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

96% escaped25 total outputs
Attack Surface

Loginpetze Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwp_loginloginpetze.php:101
actionadmin_enqueue_scriptsloginpetze.php:115
actionadmin_initloginpetze.php:122
actionadmin_menuloginpetze.php:129
actiondelete_user_formloginpetze.php:136
Maintenance & Trust

Loginpetze Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 9, 2025
PHP min version5.5
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs80
Developer Profile

Loginpetze Developer Profile

Christian Sabo

2 plugins · 4K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Loginpetze

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/loginpetze/stylesheet.css

HTML / DOM Fingerprints

HTML Comments
<!-- Loginpetze is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 2 of the License, or * any later version. --><!-- Loginpetze is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. --><!-- You should have received a copy of the GNU General Public License * along with Loginpetze. If not, see http://www.gnu.org/licenses/gpl-2.0.txt. --><!-- * If this file is called directly, abort. -->+15 more
FAQ

Frequently Asked Questions about Loginpetze