Wp Single Login Security & Risk Analysis

wordpress.org/plugins/wp-single-login

Using wp single login you can easily add the functionality to allow only single login per user.

40 active installs v1.0 PHP + WP 3.6+ Updated Nov 27, 2015
loginlogoutsingle-loginwordpress-single-login
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Wp Single Login Safe to Use in 2026?

Generally Safe

Score 85/100

Wp Single Login has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The static analysis of wp-single-login v1.0 reveals an exceptionally small attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events. This is a strong positive indicator for security. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests is commendable. The fact that all SQL queries utilize prepared statements is a significant strength, mitigating the risk of SQL injection vulnerabilities.

However, the analysis flags a critical concern regarding output escaping. With 100% of identified outputs not being properly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users without proper sanitization could be exploited by attackers to inject malicious scripts. The lack of nonce and capability checks across all entry points, while the attack surface is currently zero, means that if any new entry points are added in the future without these security measures, they would be immediately vulnerable.

The vulnerability history for this plugin is clean, with no known CVEs. This, combined with the absence of identified taint flows, suggests that the development team has historically prioritized security or that the plugin's limited functionality has not yet attracted sophisticated attacks. Despite the lack of past vulnerabilities, the current code analysis reveals a significant weakness in output escaping that needs immediate attention. The plugin's strengths lie in its minimal attack surface and secure database interaction, but the unescaped output poses a substantial risk that outweighs these benefits.

Key Concerns

  • Unescaped output found
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Wp Single Login Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Wp Single Login Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Wp Single Login Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitwp-single-login.php:22
actionwp_loginwp-single-login.php:23
filterheartbeat_receivedwp-single-login.php:24
filterheartbeat_nopriv_receivedwp-single-login.php:25
filterlogin_messagewp-single-login.php:26
actionwp_footerwp-single-login.php:37
Maintenance & Trust

Wp Single Login Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedNov 27, 2015
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs40
Developer Profile

Wp Single Login Developer Profile

Nirmal Kumar Ram

6 plugins · 31K total installs

74
trust score
Avg Security Score
93/100
Avg Patch Time
826 days
View full developer profile
Detection Fingerprints

How We Detect Wp Single Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
message
JS Globals
wp
FAQ

Frequently Asked Questions about Wp Single Login