WP Login Alerts by DigiP Security & Risk Analysis

wordpress.org/plugins/wp-login-alerts

E-mails the site owner if anyone reaches or attempts to login to the site. Also shows the user names they attempt to login with.

10 active installs v2013-05-30.10 PHP + WP 2.0.2+ Updated Apr 16, 2014
alertsdigipemailloginsecurity
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Login Alerts by DigiP Safe to Use in 2026?

Generally Safe

Score 85/100

WP Login Alerts by DigiP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

Based on the static analysis, the "wp-login-alerts" plugin v2013-05-30.10 exhibits an excellent security posture. The code analysis reveals no identifiable attack surface, meaning there are no AJAX handlers, REST API routes, shortcodes, or cron events that could be exploited. Furthermore, the plugin demonstrates strong coding practices by avoiding dangerous functions, utilizing prepared statements for all SQL queries, and properly escaping all output. File operations and external HTTP requests are also absent, further reducing the potential for vulnerabilities. The lack of taint analysis findings reinforces this, indicating no identified flows with unsanitized paths.

The plugin's vulnerability history is equally impressive, with zero recorded CVEs. This suggests a history of robust security and a lack of common or persistent vulnerabilities. The absence of any past vulnerabilities, regardless of severity, is a strong indicator of a well-developed and secure plugin.

In conclusion, the "wp-login-alerts" plugin v2013-05-30.10 appears to be highly secure based on the provided data. Its lack of attack surface, adherence to secure coding principles, and spotless vulnerability history make it a trustworthy option. There are no apparent security concerns or areas for deduction based on the evidence presented.

Vulnerabilities
None known

WP Login Alerts by DigiP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Login Alerts by DigiP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

WP Login Alerts by DigiP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionlogin_enqueue_scriptslogin-alerts.php:52
filterlogin_headerurllogin-alerts.php:58
filterlogin_headertitlelogin-alerts.php:63
Maintenance & Trust

WP Login Alerts by DigiP Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedApr 16, 2014
PHP min version
Downloads5K

Community Trust

Rating80/100
Number of ratings3
Active installs10
Developer Profile

WP Login Alerts by DigiP Developer Profile

DigiP

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Login Alerts by DigiP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Login Alerts by DigiP