Matoma Two-Factor Authentication Security & Risk Analysis

wordpress.org/plugins/2-factor

Matoma Two-Factor Authentication extends the login process by a 2nd factor to achieve increased security. After the user name and password are request …

0 active installs v1.0.3 PHP 7.2+ WP 5.5+ Updated Mar 25, 2021
authenticationloginsecuritysmstwo-factor
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Matoma Two-Factor Authentication Safe to Use in 2026?

Generally Safe

Score 85/100

Matoma Two-Factor Authentication has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "2-factor" plugin v1.0.3 presents a mixed security posture. On the positive side, it demonstrates good practices in SQL query handling, utilizing prepared statements exclusively, and has no recorded vulnerabilities in its history, suggesting a generally well-maintained codebase. The absence of dangerous functions, file operations, and critical or high severity taint flows is also a strong indicator of a secure foundation.

However, significant concerns arise from the attack surface. The plugin exposes two AJAX handlers, both of which lack authentication checks. This is a critical oversight that could allow unauthenticated users to trigger potentially sensitive actions. While the taint analysis did not reveal any issues, the presence of unprotected entry points is a primary risk. The limited number of capability checks (only 1) further exacerbates this risk, as it suggests insufficient granular control over who can perform certain actions.

In conclusion, while the plugin benefits from a clean vulnerability history and secure SQL handling, the unprotected AJAX endpoints represent a substantial security weakness. Addressing these entry points with proper authentication and capability checks should be the immediate priority to improve its overall security posture.

Key Concerns

  • AJAX handlers without auth checks
  • Limited capability checks
Vulnerabilities
None known

Matoma Two-Factor Authentication Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Matoma Two-Factor Authentication Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
18
49 escaped
Nonce Checks
3
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

73% escaped67 total outputs
Data Flows
All sanitized

Data Flow Analysis

3 flows
<mtm-2f> (mtm-2f.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Matoma Two-Factor Authentication Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_mtm_2F_generate_backup_codesMtm_2F_profil_fields.php:76
authwp_ajax_mtm_2F_woo_saveMtm_2F_woo_frontend.php:17
WordPress Hooks 25
actionlogin_headincludes\func.wp-login.php:25
actionlogin_headincludes\func.wp-login.php:27
actionlogin_footerincludes\func.wp-login.php:45
actionplugins_loadedmtm-2f.php:52
actionwp_loginmtm-2f.php:53
actionlogin_form_mtm_2Fmtm-2f.php:54
actionlogin_form_mtm_2F_validatemtm-2f.php:55
actionlogin_form_mtm_2F_resend_codemtm-2f.php:56
actionadmin_menuMtm_2F_admin_panel.php:8
actionuser_registerMtm_2F_admin_panel.php:9
actionadmin_initMtm_2F_admin_panel.php:29
actionregister_formMtm_2F_profil_fields.php:51
actionuser_registerMtm_2F_profil_fields.php:56
filterwp_new_user_notification_emailMtm_2F_profil_fields.php:58
filterregistration_errorsMtm_2F_profil_fields.php:62
actionshow_user_profileMtm_2F_profil_fields.php:64
actionedit_user_profileMtm_2F_profil_fields.php:65
actionpersonal_options_updateMtm_2F_profil_fields.php:68
actionedit_user_profile_updateMtm_2F_profil_fields.php:69
actionadmin_enqueue_scriptsMtm_2F_profil_fields.php:73
actionlogin_enqueue_scriptsMtm_2F_profil_fields.php:74
actioninitMtm_2F_woo_frontend.php:11
filterquery_varsMtm_2F_woo_frontend.php:12
filterwoocommerce_account_menu_itemsMtm_2F_woo_frontend.php:15
actionwoocommerce_account_mtm-2FA_endpointMtm_2F_woo_frontend.php:16
Maintenance & Trust

Matoma Two-Factor Authentication Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedMar 25, 2021
PHP min version7.2
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Matoma Two-Factor Authentication Developer Profile

Matoma

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Matoma Two-Factor Authentication

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/2-factor/css/mtm-2f.css/wp-content/plugins/2-factor/js/mtm-2f.js
Script Paths
/wp-content/plugins/2-factor/js/mtm-2f.js
Version Parameters
2-factor/css/mtm-2f.css?ver=2-factor/js/mtm-2f.js?ver=

HTML / DOM Fingerprints

CSS Classes
mtm-2f-login-wrappermtm-2f-passkey-inputmtm-2f-login-form
Data Attributes
data-user-iddata-noncedata-redirect-to
JS Globals
mtm_2F_login_params
FAQ

Frequently Asked Questions about Matoma Two-Factor Authentication