
Login by Auth0 Security & Risk Analysis
wordpress.org/plugins/auth0Login by Auth0 provides improved username/password login, Passwordless login, Social login and Single Sign On for all your sites.
Is Login by Auth0 Safe to Use in 2026?
Mostly Safe
Score 83/100Login by Auth0 is generally safe to use though it hasn't been updated recently. 7 past CVEs were resolved.
The Auth0 plugin v4.6.2 exhibits a mixed security posture. On the positive side, it demonstrates strong practices in secure coding by exclusively using prepared statements for SQL queries, achieving excellent output escaping rates, and implementing nonce and capability checks on most entry points. The absence of dangerous functions, file operations, and external HTTP requests is also commendable. However, a significant concern arises from the presence of one unprotected AJAX handler, which represents an easily exploitable entry point into the plugin's functionality. The plugin's vulnerability history is a substantial red flag, with a total of seven known CVEs, including one critical and two high-severity issues. While no vulnerabilities are currently unpatched, the recurring pattern of cross-site scripting, authorization bypass, injection, and CSRF vulnerabilities suggests persistent weaknesses in input validation and authorization mechanisms that require ongoing attention. Despite the strong static analysis results for current code, the historical context necessitates a cautious approach.
Key Concerns
- Unprotected AJAX handler
- History of 1 critical CVE
- History of 2 high CVEs
- History of 4 medium CVEs
- Common vulnerability types (XSS, Auth Bypass, Injection, CSRF)
Login by Auth0 Security Vulnerabilities
CVEs by Year
Severity Breakdown
7 total CVEs
Login by Auth0 <= 4.6.0 - Reflected Cross-Site Scripting via wle
Login by Auth0 <= 3.11.3 - Insecure Direct Object Reference
Login by Auth0 <= 3.11.3 - CSV Injection
Login by Auth0 <= 3.11.3 - Stored Cross-Site Scripting
Login by Auth0 <= 3.11.3 - Cross-Site Request Forgery
Login by Auth0 Plugin <= 3.11.3 - Stored Cross-Site Scripting
Login by Auth0 3.11.0 - 3.11.2 - Cross-Site Scripting
Login by Auth0 Release Timeline
Login by Auth0 Code Analysis
Output Escaping
Data Flow Analysis
Login by Auth0 Attack Surface
AJAX Handlers 4
Shortcodes 1
WordPress Hooks 38
Maintenance & Trust
Login by Auth0 Maintenance & Trust
Maintenance Signals
Community Trust
Login by Auth0 Alternatives
Rublon Multi-Factor Authentication (MFA)
rublon
Instant account security with effortless multi-factor authentication via Mobile Push, Mobile Passcode (TOTP), WebAuthn/U2F Security Keys, and more.
Secufor_OAuth
wpoauth
Looking for a budget-friendly alternative to expensive SSO solutions? Our OAuth extension provides the same robust security and provider support as Mi …
All-In-One Security (AIOS) – Security and Firewall
all-in-one-wp-security-and-firewall
Protect your website investment with All-In-One Security (AIOS) – a comprehensive and easy to use security plugin designed especially for WordPress.
Solid Security – Password, Two Factor Authentication, and Brute Force Protection
better-wp-security
Harden your site security with Login Security, Two-Factor Authentication (2FA), Vulnerability Scanner, Firewall, and more. Formerly iThemes Security.
Limit Login Attempts
limit-login-attempts
Limit rate of login attempts, including by way of cookies, for each IP. Fully customizable.
Login by Auth0 Developer Profile
1 plugin · 10K total installs
How We Detect Login by Auth0
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/auth0/assets/css/login.css/wp-content/plugins/auth0/assets/css/main.cssauth0/login.css?ver=auth0-widget/main.css?ver=HTML / DOM Fingerprints
avatar-auth0data-lock-iddata-access-tokendata-id-tokendata-domaindata-client-iddata-redirect-uri+6 moreWP_Auth0_LockAuth0[auth0]