URL Based Login Security & Risk Analysis

wordpress.org/plugins/url-based-login

URL Based Login allows you to directly login from an allowed Login URL.

10 active installs v1.1 PHP + WP 3.0+ Updated Mar 23, 2015
authenticationautobasedloginurl
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is URL Based Login Safe to Use in 2026?

Generally Safe

Score 85/100

URL Based Login has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "url-based-login" v1.1 plugin exhibits a mixed security posture. On the positive side, it boasts a seemingly small attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events exposed without authentication. The presence of a nonce check and a capability check are also good indicators of some security awareness in its development. However, significant concerns arise from the static analysis of its code. Notably, a concerning 100% of its output is not properly escaped, posing a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the taint analysis reveals two flows with unsanitized paths, classified as high severity, which could potentially lead to injection-type attacks or other sensitive data manipulation if exploited.

The plugin's vulnerability history is clean, with no known CVEs. This lack of past vulnerabilities is a positive sign, suggesting a potentially stable codebase. However, it's crucial to balance this with the current findings. The absence of vulnerabilities might be due to a lack of targeted testing or exploitation rather than inherent security. The critical weakness lies in the unescaped output and the identified high-severity taint flows, which are significant risks that need immediate attention. While the plugin doesn't have a history of exploits, the current static analysis indicates a present danger that could be exploited if an attacker discovers these weaknesses. Therefore, despite a clean CVE record, the plugin's overall security is compromised by the identified code-level risks.

Key Concerns

  • 100% of outputs are not properly escaped
  • 2 high severity taint flows with unsanitized paths
Vulnerabilities
None known

URL Based Login Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

URL Based Login Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
4 prepared
Unescaped Output
16
0 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

57% prepared7 total queries

Output Escaping

0% escaped16 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
url_based_login_option_page (url-based-login.php:225)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

URL Based Login Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionplugins_loadedurl-based-login.php:77
actionwp_before_admin_bar_renderurl-based-login.php:120
actioniniturl-based-login.php:124
actionadmin_menuurl-based-login.php:125
Maintenance & Trust

URL Based Login Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedMar 23, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

URL Based Login Developer Profile

iamudit

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect URL Based Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about URL Based Login