WP LogInOut Security & Risk Analysis

wordpress.org/plugins/wp-loginout

Show login or logout button on any menu based on user login or logout status dynamically.

10 active installs v0.1.7 PHP + WP 4.0+ Updated Nov 26, 2024
automaticallybuttonloginlogoutmenu
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP LogInOut Safe to Use in 2026?

Generally Safe

Score 92/100

WP LogInOut has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The wp-loginout plugin, in version 0.1.7, exhibits a generally good security posture based on the provided static analysis. The absence of a significant attack surface, including AJAX handlers, REST API routes, shortcodes, and cron events without proper authentication or permission checks, is a strong indicator of secure design. Furthermore, the code's adherence to prepared statements for all SQL queries and the presence of at least one capability check demonstrate an awareness of common WordPress security pitfalls.

However, a notable concern arises from the output escaping. With 7 total outputs analyzed and only 43% properly escaped, there's a significant risk of Cross-Site Scripting (XSS) vulnerabilities. This means that user-supplied data, if not carefully handled before being displayed, could be maliciously injected and executed by other users' browsers. The absence of nonce checks, while not directly tied to an identified vulnerability in this specific analysis, is a missed opportunity to further harden the plugin against CSRF attacks, especially if any entry points were to be introduced in future versions.

The plugin's vulnerability history is currently clean, with zero known CVEs. This, combined with the lack of critical or high-severity issues identified in the taint analysis, suggests a history of responsible development. However, the clean history alone should not overshadow the identified output escaping issue, which presents a tangible risk. Overall, the plugin has strong foundational security practices but requires immediate attention to its output sanitization to mitigate XSS risks.

Key Concerns

  • Insufficient output escaping
Vulnerabilities
None known

WP LogInOut Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP LogInOut Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
3 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

43% escaped7 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
wp_loginout_options (wp-loginout.php:22)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP LogInOut Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menuwp-loginout.php:17
Maintenance & Trust

WP LogInOut Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 26, 2024
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP LogInOut Developer Profile

nabtron

5 plugins · 1K total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP LogInOut

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
nab_ll_ulnab_ll_class
Data Attributes
name="wp_loginout_form"name="nab_wp_loginout_h"id="nab_menu_location"name="nab_menu_location"id="nab_ll_before"name="nab_ll_before"+2 more
FAQ

Frequently Asked Questions about WP LogInOut