
Read More Login Security & Risk Analysis
wordpress.org/plugins/read-more-loginPut a combined read more/login/registration form in your posts and pages. The visitors must log in or sign up to read more.
Is Read More Login Safe to Use in 2026?
Use With Caution
Score 63/100Read More Login has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The "read-more-login" v2.0.3 plugin exhibits a mixed security posture. While it demonstrates good practices by utilizing prepared statements for all SQL queries and performing nonce checks, there are significant concerns regarding output sanitization and a history of medium-severity vulnerabilities. The static analysis reveals a low percentage (6%) of properly escaped outputs, indicating a potential for Cross-Site Scripting (XSS) vulnerabilities. The presence of a file operation and an external HTTP request without explicit mentions of sanitization or authentication checks in the static analysis results warrants further investigation.
The vulnerability history shows one known medium-severity CVE, identified as Cross-Site Scripting (XSS), which is currently unpatched. This indicates a recurring pattern of input validation and output sanitization weaknesses. The fact that this vulnerability is recent (dated 2025-06-05) and unpatched is a critical concern, suggesting that users of this plugin are actively exposed to this risk.
In conclusion, despite some positive security implementations like prepared statements and nonce checks, the plugin's low output escaping rate and its unpatched XSS vulnerability significantly lower its overall security score. The presence of file operations and external HTTP requests, without clear security controls indicated, adds to the potential risk profile. Users should exercise extreme caution until these issues are addressed.
Key Concerns
- Unpatched medium severity CVE (XSS)
- Low percentage of properly escaped outputs
- File operation without clear security context
- External HTTP request without clear security context
Read More Login Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Read More Login <= 2.0.3 - Authenticated (Administrator+) Stored Cross-Site Scripting
Read More Login Code Analysis
Output Escaping
Read More Login Attack Surface
Shortcodes 7
WordPress Hooks 19
Scheduled Events 1
Maintenance & Trust
Read More Login Maintenance & Trust
Maintenance Signals
Community Trust
Read More Login Alternatives
Login to read more
login-to-read-more
Display content enclosed by the shortcode for registered users only.
Protect Ai Login
protect-ai-login
Change default login site to a custom URL, block spam, bot registration, and brute-force using Google reCAPTCHA.
Loginizer
loginizer
Loginizer is a WordPress security plugin which helps you fight against bruteforce attacks.
Temporary Login Without Password
temporary-login-without-password
Create self-expiring, temporary admin accounts. Easily share direct login links (no need for username/password) with your developers or editors.
Wp Social Login and Register Social Counter
wp-social
Wp social lets you add social login, social counter, and social share buttons of different styles to your WordPress website.
Read More Login Developer Profile
1 plugin · 200 total installs
How We Detect Read More Login
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/read-more-login/css/rml_style.cssread-more-login/css/rml_style.css?ver=HTML / DOM Fingerprints
aru_rml_login_widgetaru_rml_login_widget span