WP RSlogin Security & Risk Analysis

wordpress.org/plugins/wp-rslogin

An elegant jQuery Ajax Wordpress plugin that helps your users login without touching in the admin panel.

10 active installs v1.1.0 PHP + WP 3.0.0+ Updated Jun 1, 2017
ajax-loginjquery-loginlog-inloginreset-password
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP RSlogin Safe to Use in 2026?

Generally Safe

Score 85/100

WP RSlogin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The wp-rslogin v1.1.0 plugin exhibits a generally good security posture with no identified vulnerabilities in its history and a limited attack surface. The static analysis reveals no dangerous functions, raw SQL queries, file operations, external HTTP requests, or bundled libraries, all of which are positive indicators. Furthermore, the plugin does not appear to have any known CVEs, which is a significant strength.

However, a critical concern arises from the output escaping. With 8 total outputs and 0% properly escaped, there's a high risk of cross-site scripting (XSS) vulnerabilities. Any data processed by the plugin and then displayed to users without proper sanitization could be exploited. While the absence of untrusted input flowing into dangerous functions or SQL queries is positive, the lack of output escaping creates a significant and readily exploitable attack vector.

In conclusion, the plugin is strong in preventing common server-side vulnerabilities like SQL injection and unauthorized access. Its clean vulnerability history is reassuring. Nevertheless, the complete lack of output escaping presents a severe risk of XSS, which needs immediate attention. This weakness significantly overshadows the otherwise positive aspects of the plugin's security.

Key Concerns

  • 0% output escaping
Vulnerabilities
None known

WP RSlogin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP RSlogin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped8 total outputs
Attack Surface

WP RSlogin Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wp_rslogin] wp-rslogin.php:29
WordPress Hooks 2
actionwp_print_scriptswp-rslogin.php:16
actionwp_print_styleswp-rslogin.php:23
Maintenance & Trust

WP RSlogin Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedJun 1, 2017
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP RSlogin Developer Profile

ryscript

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP RSlogin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-rslogin/css/rslogin-style.css/wp-content/plugins/wp-rslogin/js/custom.js
Script Paths
http://ajax.googleapis.com/ajax/libs/jquery/1.7.0/jquery.min.js/wp-content/plugins/wp-rslogin/js/custom.js

HTML / DOM Fingerprints

CSS Classes
panel-cotainerpaneluser-loginloggedinprofile-picprofile-infouserloggeduser-info-list+7 more
Data Attributes
id="loginform"id="username"id="password"id="rememberme"id="login_btn"name="task"+7 more
JS Globals
LLP
Shortcode Output
<div class="panel-cotainer"><div class="panel"><div class="user-login"><div class="loggedin">
FAQ

Frequently Asked Questions about WP RSlogin