
LoginWP (Formerly Peter's Login Redirect) Security & Risk Analysis
wordpress.org/plugins/peters-login-redirectRedirect users to different locations after they log in, log out and register based on different conditions.
Is LoginWP (Formerly Peter's Login Redirect) Safe to Use in 2026?
Generally Safe
Score 98/100LoginWP (Formerly Peter's Login Redirect) has a strong security track record. Known vulnerabilities have been patched promptly.
The 'peters-login-redirect' plugin, version 3.0.8.8, presents a mixed security posture. While the static analysis shows a good number of defensive measures like nonce and capability checks, the output escaping is a significant concern, with only 48% of outputs being properly escaped. This could leave the plugin vulnerable to Cross-Site Scripting (XSS) attacks if user-supplied data is not handled with sufficient care. The SQL query preparedness is also not ideal, with 45% of queries not using prepared statements, which could introduce SQL injection risks. The plugin's vulnerability history is notable, with 3 past CVEs, including one high severity XSS and two medium severity vulnerabilities. The absence of currently unpatched vulnerabilities is positive, but the recurring nature of XSS and CSRF in its history suggests a pattern of input validation and output sanitization weaknesses that have been exploited previously.
Despite the presence of many security checks, the code signals for output escaping and SQL query preparedness raise red flags. The attack surface is primarily composed of AJAX handlers, all of which appear to have authentication checks, which is a positive sign. However, the lack of robust sanitization and escaping mechanisms creates potential entry points for attackers. The vulnerability history further reinforces the need for caution, as past issues point to fundamental security flaws that may not be entirely resolved in this version. Overall, while the plugin attempts to implement security controls, the identified weaknesses in output sanitization and SQL practices, combined with its vulnerability history, indicate a moderate to high risk of exploitation.
Key Concerns
- Output escaping is only 48% properly escaped
- 55% of SQL queries use prepared statements (45% don't)
- 1 High severity CVE in vulnerability history
- 2 Medium severity CVEs in vulnerability history
LoginWP (Formerly Peter's Login Redirect) Security Vulnerabilities
CVEs by Year
Severity Breakdown
3 total CVEs
LoginWP < 3.0.0.5 - Reflected Cross-Site Scripting via rul_login_url, rul_logout_url Parameter
LoginWP <= 2.9.1 - Multiple Cross-Site Request Forgery vulnerabilities
LoginWP < 2.9.1 - Cross-Site Scripting
LoginWP (Formerly Peter's Login Redirect) Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
LoginWP (Formerly Peter's Login Redirect) Attack Surface
AJAX Handlers 6
WordPress Hooks 54
Maintenance & Trust
LoginWP (Formerly Peter's Login Redirect) Maintenance & Trust
Maintenance Signals
Community Trust
LoginWP (Formerly Peter's Login Redirect) Alternatives
WP Login and Logout Redirect
wp-login-and-logout-redirect
This plugin enable simple and easy way to redirect user to your chosen page URL after login or logout or both.
Sky Login Redirect
sky-login-redirect
Control where users land after login/logout. Redirect by role, user, or previous page. Includes a powerful login customizer and WooCommerce support.
PowerUp – Admin Tools (Login/Logout Redirects, Scripts & Comments Control)
powerup
Simplify site management with Login/Logout Redirect, Hide Admin Bar, Disable Comments, Header Footer Scripts and Remove Footer Credit.
WC Quick Customer Redirects
wc-quick-customer-redirects
This plugin lets you set custom page redirects for customers after registration, login, logout actions.
VS Custom Redirects
very-simple-custom-redirects
With this lightweight plugin you can set a custom page redirect for the default Login, Logout, Register and Lost Password feature.
LoginWP (Formerly Peter's Login Redirect) Developer Profile
4 plugins · 212K total installs
How We Detect LoginWP (Formerly Peter's Login Redirect)
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/peters-login-redirect/assets/css/admin.css/wp-content/plugins/peters-login-redirect/assets/js/admin.js/wp-content/plugins/peters-login-redirect/assets/js/admin.jspeters-login-redirect/assets/css/admin.css?ver=peters-login-redirect/assets/js/admin.js?ver=HTML / DOM Fingerprints
loginwp-adminloginwp_globals