WP-UserLogin Security & Risk Analysis

wordpress.org/plugins/wp-userlogin

Front page login/logout and control panel.

20 active installs v16.01 PHP + WP 3.0+ Updated Jan 27, 2016
loginuserloginusersusersloginwp-userlogin
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-UserLogin Safe to Use in 2026?

Generally Safe

Score 85/100

WP-UserLogin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'wp-userlogin' v16.01 plugin exhibits a mixed security posture. On the positive side, there are no known CVEs associated with this plugin, indicating a potentially stable history. Furthermore, the static analysis shows a promising lack of attack surface through typical vectors like AJAX, REST API, shortcodes, and cron events. The presence of a significant number of capability checks (27) suggests an awareness of user role management.

However, the code analysis reveals several concerning areas. The most significant risk stems from the fact that 100% of the SQL queries are not using prepared statements, posing a high risk of SQL injection vulnerabilities. Additionally, a complete absence of output escaping (0%) for 35 identified output points is a critical flaw, leaving the plugin vulnerable to Cross-Site Scripting (XSS) attacks. While taint analysis found no critical or high severity flows, the presence of two flows with unsanitized paths warrants attention, especially in conjunction with the unescaped output. The lack of nonce checks on AJAX handlers (though there are no AJAX handlers in this version) and the file operations without explicit security context also represent potential, albeit currently theoretical, weaknesses.

In conclusion, while the plugin has a clean vulnerability history and a limited attack surface, the critical findings regarding SQL and output handling are major security concerns that significantly outweigh the strengths. The plugin requires immediate attention to address the lack of prepared statements and proper output escaping to mitigate severe risks.

Key Concerns

  • Raw SQL queries without prepared statements
  • Lack of output escaping
  • Taint flows with unsanitized paths
Vulnerabilities
None known

WP-UserLogin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-UserLogin Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
35
0 escaped
Nonce Checks
0
Capability Checks
27
File Operations
6
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries

Output Escaping

0% escaped35 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
wpul_style_editor (userlogin.php:232)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP-UserLogin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionwp_enqueue_scriptsuserlogin.php:56
actionadmin_inituserlogin.php:416
actionadmin_menuuserlogin.php:417
filterget_avataruserlogin.php:418
filterlogin_form_middleuserlogin.php:419
actionwidgets_inituserlogin.php:420
actionplugins_loadeduserlogin.php:428
Maintenance & Trust

WP-UserLogin Maintenance & Trust

Maintenance Signals

WordPress version tested4.*
Last updatedJan 27, 2016
PHP min version
Downloads45K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

WP-UserLogin Developer Profile

Jerry Stephens

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-UserLogin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-userlogin/css/wpul.css

HTML / DOM Fingerprints

CSS Classes
thumbnail
Data Attributes
data-toggledata-target
JS Globals
wpul_settings
Shortcode Output
[wp_user_login]
FAQ

Frequently Asked Questions about WP-UserLogin