
Longer Login ("Remember Me" Extension) Security & Risk Analysis
wordpress.org/plugins/longer-loginLonger Login allows customizing the length of WordPress' "Remember Me" length. No more automatic logouts every few days!
Is Longer Login ("Remember Me" Extension) Safe to Use in 2026?
Generally Safe
Score 85/100Longer Login ("Remember Me" Extension) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'longer-login' plugin v1.0.0 exhibits a strong security posture based on the provided static analysis. There is no apparent attack surface exposed through AJAX, REST API, shortcodes, or cron events. Furthermore, the code signals indicate a lack of dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), file operations, external HTTP requests, and importantly, no evident taint flows. This suggests a well-written plugin with a focus on secure coding practices.
However, a significant concern arises from the output escaping. With one total output and 0% properly escaped, this indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data outputted by the plugin to the browser without proper escaping is susceptible to manipulation, allowing an attacker to inject malicious scripts. The absence of any known CVEs or past vulnerabilities is a positive indicator, suggesting the developers have a history of producing secure code, but this does not negate the immediate risk posed by the unescaped output.
In conclusion, while the plugin is commendably free of common vulnerabilities like SQL injection and lacks a significant attack surface, the critical flaw in output escaping presents a substantial security risk. Prioritizing the proper escaping of all outputs should be the immediate focus to mitigate the potential for XSS attacks. The lack of known historical vulnerabilities is a strength, but the identified coding deficiency requires prompt attention.
Key Concerns
- Output not properly escaped
Longer Login ("Remember Me" Extension) Security Vulnerabilities
Longer Login ("Remember Me" Extension) Code Analysis
Output Escaping
Longer Login ("Remember Me" Extension) Attack Surface
WordPress Hooks 2
Maintenance & Trust
Longer Login ("Remember Me" Extension) Maintenance & Trust
Maintenance Signals
Community Trust
Longer Login ("Remember Me" Extension) Alternatives
Remember Me Controls
remember-me-controls
Have "Remember Me" checked by default on the login page and configure how long a login is remembered. Or disable the feature altogether.
Always Remember Me
always-remember-me
Always checked 'Remember Me' checkbox and longer auth cookie expiration. Your blog will remember you.
Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More
themeisle-companion
Add modules like share buttons, header & footer scripts, disable comments, reading progress bar, custom fonts, custom login page & more in one plugin.
Easy Timeout Session
easy-timeout-session
The Easy Timeout Session WordPress plugin allows you to change the session duration for the WordPress user.
Biscotti
biscotti
Biscotti makes your user's login cookie a little bit longer.
Longer Login ("Remember Me" Extension) Developer Profile
1 plugin · 100 total installs
How We Detect Longer Login ("Remember Me" Extension)
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
Copyright 2015 John Morris (email : johntylermorris@jtmorris.net)This program is free software; you can redistribute it and/or modifyit under the terms of the GNU General Public License, version 2, aspublished by the Free Software Foundation.+33 morelolo_login_expiration_length