User Login Plus Security & Risk Analysis

wordpress.org/plugins/user-login-plus

Show a users last login date by creating a sortable column in your WordPress users list.

0 active installs v1.1 PHP 5.6+ WP 4.0+ Updated Dec 30, 2017
last-logged-inlast-loginlast-seenuser-loginuser-login-time
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is User Login Plus Safe to Use in 2026?

Generally Safe

Score 85/100

User Login Plus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The user-login-plus plugin v1.1 exhibits a generally strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with insufficient authentication significantly limits the plugin's attack surface. Furthermore, the code shows good practices with all SQL queries utilizing prepared statements and the presence of a capability check. The lack of file operations and external HTTP requests also reduces potential risks. However, the analysis did reveal a weakness in output escaping, with only 50% of outputs being properly escaped. This could potentially lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is displayed without adequate sanitization.

The vulnerability history for user-login-plus is entirely clear, with no recorded CVEs. This suggests a history of responsible development and timely patching, or that the plugin has not been a significant target for past vulnerabilities. Coupled with the zero taint flows indicating no critical or high-severity unsanitized paths, the plugin appears to be developed with security in mind. The primary concern highlighted by the static analysis is the output escaping. While the overall security is good, this specific area warrants attention to ensure all dynamic content is handled securely.

Key Concerns

  • 50% of outputs not properly escaped
Vulnerabilities
None known

User Login Plus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

User Login Plus Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

User Login Plus Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
2
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

50% escaped4 total outputs
Attack Surface

User Login Plus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionwp_loginuser-login-plus.php:14
filtermanage_users_columnsuser-login-plus.php:16
filtermanage_users_custom_columnuser-login-plus.php:17
actionwp_login_faileduser-login-plus.php:19
actionlogin_redirectuser-login-plus.php:20
filterlogin_messageuser-login-plus.php:21
actionshow_user_profileuser-login-plus.php:23
actionedit_user_profileuser-login-plus.php:24
actionuser_new_formuser-login-plus.php:25
actionpersonal_options_updateuser-login-plus.php:27
actionedit_user_profile_updateuser-login-plus.php:28
actionuser_registeruser-login-plus.php:29
filterlogin_errorsuser-login-plus.php:259
Maintenance & Trust

User Login Plus Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedDec 30, 2017
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

User Login Plus Developer Profile

appally

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect User Login Plus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/user-login-plus/user-login-plus.php

HTML / DOM Fingerprints

CSS Classes
message
FAQ

Frequently Asked Questions about User Login Plus