
User Last Login Security & Risk Analysis
wordpress.org/plugins/user-last-loginDisplays login datetime in manage users screen and sorts users by last login time.
Is User Last Login Safe to Use in 2026?
Generally Safe
Score 85/100User Last Login has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'user-last-login' plugin v1.2 presents a mixed security posture. On the positive side, it has no known vulnerabilities, no dangerous functions, uses prepared statements for all SQL queries, and avoids file operations and external HTTP requests. The attack surface is also minimal with only one shortcode, and importantly, all identified entry points appear to be protected by authentication checks (though not explicitly detailed). Taint analysis shows no critical or high-severity issues, indicating a lack of detectable unsanitized data flows.
However, there are significant concerns regarding output escaping, with only 29% of outputs being properly escaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities if user-controlled data is directly outputted without sanitization. The absence of nonce checks is also a notable weakness, as these are crucial for preventing Cross-Site Request Forgery (CSRF) attacks, especially for features that modify data or perform actions. The plugin also has zero capability checks, meaning there's no verification of user roles or permissions for its functionalities, which could be a risk if the shortcode or any implicit actions can be leveraged by unauthorized users.
Given the clean vulnerability history, the plugin appears to have been developed with some security awareness. However, the deficiencies in output escaping and the complete lack of nonce and capability checks introduce exploitable weaknesses. The limited attack surface and good SQL practices mitigate some of the risk, but the potential for XSS and CSRF warrants attention. Overall, while not critically vulnerable based on the provided static analysis and history, the plugin is not as robustly secured as it could be and has clear areas for improvement.
Key Concerns
- Output escaping is insufficient (29% proper)
- Missing nonce checks
- Missing capability checks
User Last Login Security Vulnerabilities
User Last Login Code Analysis
Output Escaping
User Last Login Attack Surface
Shortcodes 1
WordPress Hooks 8
Maintenance & Trust
User Last Login Maintenance & Trust
Maintenance Signals
Community Trust
User Last Login Alternatives
Mighty CAPTCHA
mighty-captcha
Mighty-CAPTCHA add an authentication with Google reCAPTCHA technology to login, comment, and register form, with API keys which delivered by Google.
Captcha Code
captcha-code-authentication
GDPR compatible captcha anti-spam protection for login form, comments form, registration form & lost password form. Eliminate spam with captcha.
When Last Login
when-last-login
Show a users last login date by creating a sortable column in your WordPress users list.
WP Last Login
wp-last-login
Make the last login for each user visible in the user overview.
CBX User Online & Last Login
cbxuseronline
Shows online users based on cookie for guest and session for registered user. It also records the last login of user.
User Last Login Developer Profile
1 plugin · 600 total installs
How We Detect User Last Login
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
user_last_login_widgetuser_last_login[user_last_login]