WP Easy Login – Remember Recent Usernames Security & Risk Analysis

wordpress.org/plugins/wp-easy-login

WP Easy Login stores the recent logins and makes it easy for you to login by selecting an account.

0 active installs v1.0.3 PHP 7.0+ WP 4.9+ Updated Apr 20, 2025
easy-loginloginrecent-loginsremember-username
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Easy Login – Remember Recent Usernames Safe to Use in 2026?

Generally Safe

Score 92/100

WP Easy Login – Remember Recent Usernames has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "wp-easy-login" v1.0.3 plugin exhibits a mixed security posture. While the code analysis reveals a lack of dangerous functions, file operations, external HTTP requests, and an absence of known vulnerabilities in its history are positive signs, significant concerns arise from its attack surface. The presence of two AJAX handlers, both entirely without authentication checks, presents a substantial risk. Furthermore, only 50% of output is properly escaped, indicating potential for cross-site scripting (XSS) vulnerabilities, particularly when combined with the unprotected AJAX endpoints.

The absence of taint analysis flows and critical security signals in the code is encouraging, suggesting that complex, high-severity vulnerabilities might not be present. However, the lack of capability checks and nonce checks on the AJAX handlers means that any user, regardless of their role or permissions, could potentially interact with these endpoints, leading to unintended actions or information disclosure. The plugin's vulnerability history, being clean, is a positive indicator, but it does not negate the risks identified in the current static analysis.

In conclusion, the "wp-easy-login" plugin shows strengths in avoiding common pitfalls like dangerous functions and raw SQL queries. However, the critical weakness lies in its exposed and unprotected AJAX endpoints, coupled with insufficient output escaping. These factors create a significant risk of unauthorized access and potential XSS attacks, which outweigh the positive aspects of its clean vulnerability history and lack of certain dangerous code patterns. Remediation efforts should focus heavily on securing these AJAX handlers.

Key Concerns

  • AJAX handlers without auth checks
  • AJAX handlers without auth checks
  • Output escaping is only 50% proper
  • No nonce checks on AJAX handlers
  • No capability checks on AJAX handlers
Vulnerabilities
None known

WP Easy Login – Remember Recent Usernames Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP Easy Login – Remember Recent Usernames Release Timeline

v1.0.3Current
v1.0.2
v1.0.1
v1.0
Code Analysis
Analyzed Mar 17, 2026

WP Easy Login – Remember Recent Usernames Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
7 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped14 total outputs
Attack Surface
2 unprotected

WP Easy Login – Remember Recent Usernames Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_wp_el_remove_accincludes\WP_Easy_Login.php:75
noprivwp_ajax_wp_el_remove_accincludes\WP_Easy_Login.php:76
WordPress Hooks 7
actionadmin_menuadmin\WP_Easy_Admin.php:19
actionadmin_initadmin\WP_Easy_Admin.php:20
filterplugin_row_metaadmin\WP_Easy_Admin.php:22
actionwp_loginincludes\WP_Easy_Login.php:71
actioninitincludes\WP_Easy_Login.php:72
actionlogin_formincludes\WP_Easy_Login.php:73
actionlogin_enqueue_scriptsincludes\WP_Easy_Login.php:74
Maintenance & Trust

WP Easy Login – Remember Recent Usernames Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 20, 2025
PHP min version7.0
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs0
Developer Profile

WP Easy Login – Remember Recent Usernames Developer Profile

Sumit Singh

3 plugins · 21K total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
383 days
View full developer profile
Detection Fingerprints

How We Detect WP Easy Login – Remember Recent Usernames

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-easy-login/css/wp-easy-login.css/wp-content/plugins/wp-easy-login/js/wp-easy-login.js
Script Paths
/wp-content/plugins/wp-easy-login/js/wp-easy-login.js
Version Parameters
wp-easy-login/css/wp-easy-login.css?ver=wp-easy-login/js/wp-easy-login.js?ver=

HTML / DOM Fingerprints

CSS Classes
wp-el-login-widgetwp-el-login-widget-inner
HTML Comments
<!-- WP Easy Login | Start : Login Widget --><!-- WP Easy Login | End : Login Widget -->
Data Attributes
data-wpel-actiondata-wpel-noncedata-wpel-username
JS Globals
wp_easy_login_ajax_object
REST Endpoints
/wp-json/wp-easy-login/v1/get_usernames
FAQ

Frequently Asked Questions about WP Easy Login – Remember Recent Usernames