
Remember Me Controls Security & Risk Analysis
wordpress.org/plugins/remember-me-controlsHave "Remember Me" checked by default on the login page and configure how long a login is remembered. Or disable the feature altogether.
Is Remember Me Controls Safe to Use in 2026?
Generally Safe
Score 91/100Remember Me Controls has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.
The "remember-me-controls" v2.1 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices with 100% of SQL queries using prepared statements and a high percentage of properly escaped output. The absence of file operations and external HTTP requests is also reassuring. However, significant concerns arise from its attack surface. Two AJAX handlers are present, and alarmingly, both lack authentication checks, creating potential entry points for unauthorized actions. The presence of the `unserialize` function, a known dangerous function, without any reported taint flows to suggest it's mitigated is a notable weakness. The plugin's vulnerability history, despite having only one known CVE, is concerning as it was a medium severity vulnerability related to sensitive information exposure, and the last vulnerability was relatively recent. The lack of any nonces on its AJAX handlers further exacerbates the risk of these entry points.
Overall, while the plugin has some strong security fundamentals in its data handling (SQL and output escaping), the unprotected AJAX endpoints and the presence of `unserialize` without evident safeguards present a clear and present risk. The medium severity information exposure vulnerability in its history also suggests a past pattern of security flaws that could be revisited. The combination of an exposed attack surface and a history of sensitive data exposure warrants caution and immediate attention to the unprotected AJAX handlers and the `unserialize` function.
Key Concerns
- AJAX handlers without auth checks
- Dangerous function unserialize present
- AJAX handlers without nonce checks
- Medium severity vulnerability in history
Remember Me Controls Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Remember Me Controls <= 2.0.1 - Unauthenticated Full Path Disclosure
Remember Me Controls Release Timeline
Remember Me Controls Code Analysis
Dangerous Functions Found
Output Escaping
Remember Me Controls Attack Surface
AJAX Handlers 2
WordPress Hooks 18
Maintenance & Trust
Remember Me Controls Maintenance & Trust
Maintenance Signals
Community Trust
Remember Me Controls Alternatives
Longer Login ("Remember Me" Extension)
longer-login
Longer Login allows customizing the length of WordPress' "Remember Me" length. No more automatic logouts every few days!
Always Remember Me
always-remember-me
Always checked 'Remember Me' checkbox and longer auth cookie expiration. Your blog will remember you.
Easy Timeout Session
easy-timeout-session
The Easy Timeout Session WordPress plugin allows you to change the session duration for the WordPress user.
Safe Cookies
safe-cookies
Secure your wordpress site by making the Auth Cookie more secure
Safer Cookies
safer-cookies
Ties the WP session cookie to your IP address so that it can't be used to get access to you blog from another computer.
Remember Me Controls Developer Profile
63 plugins · 92K total installs
How We Detect Remember Me Controls
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/remember-me-controls/c2c-plugin.php/wp-content/plugins/remember-me-controls/remember-me-controls.phpremember-me-controls/style.css?ver=remember-me-controls/remember-me-controls.js?ver=HTML / DOM Fingerprints
c2c-notice-inlinenotice-info