Longer Login ("Remember Me" Extension) Security & Risk Analysis

wordpress.org/plugins/longer-login

Longer Login allows customizing the length of WordPress' "Remember Me" length. No more automatic logouts every few days!

100 active installs v1.0.0 PHP + WP 4.1+ Updated Jun 2, 2015
cookieexpirationloginrememberremember-me
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Longer Login ("Remember Me" Extension) Safe to Use in 2026?

Generally Safe

Score 85/100

Longer Login ("Remember Me" Extension) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'longer-login' plugin v1.0.0 exhibits a strong security posture based on the provided static analysis. There is no apparent attack surface exposed through AJAX, REST API, shortcodes, or cron events. Furthermore, the code signals indicate a lack of dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), file operations, external HTTP requests, and importantly, no evident taint flows. This suggests a well-written plugin with a focus on secure coding practices.

However, a significant concern arises from the output escaping. With one total output and 0% properly escaped, this indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data outputted by the plugin to the browser without proper escaping is susceptible to manipulation, allowing an attacker to inject malicious scripts. The absence of any known CVEs or past vulnerabilities is a positive indicator, suggesting the developers have a history of producing secure code, but this does not negate the immediate risk posed by the unescaped output.

In conclusion, while the plugin is commendably free of common vulnerabilities like SQL injection and lacks a significant attack surface, the critical flaw in output escaping presents a substantial security risk. Prioritizing the proper escaping of all outputs should be the immediate focus to mitigate the potential for XSS attacks. The lack of known historical vulnerabilities is a strength, but the identified coding deficiency requires prompt attention.

Key Concerns

  • Output not properly escaped
Vulnerabilities
None known

Longer Login ("Remember Me" Extension) Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Longer Login ("Remember Me" Extension) Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Longer Login ("Remember Me" Extension) Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterauth_cookie_expirationlonger-login.php:31
filteradmin_initlonger-login.php:53
Maintenance & Trust

Longer Login ("Remember Me" Extension) Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedJun 2, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Longer Login ("Remember Me" Extension) Developer Profile

John Morris

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Longer Login ("Remember Me" Extension)

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
Copyright 2015 John Morris (email : johntylermorris@jtmorris.net)This program is free software; you can redistribute it and/or modifyit under the terms of the GNU General Public License, version 2, aspublished by the Free Software Foundation.+33 more
Data Attributes
lolo_login_expiration_length
FAQ

Frequently Asked Questions about Longer Login ("Remember Me" Extension)