BaseCloud Shield Security & Risk Analysis

wordpress.org/plugins/basecloud-shield

Enterprise-grade Two-Factor Authentication (2FA) with support for Email, SendGrid API, Webhooks, WhatsApp, and SMS delivery.

30 active installs v1.4.5 PHP 7.4+ WP 5.0+ Updated Mar 27, 2026
2faauthenticationotpsecuritytwo-factor
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is BaseCloud Shield Safe to Use in 2026?

Generally Safe

Score 100/100

BaseCloud Shield has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The basecloud-shield plugin v1.4.5 exhibits a generally strong security posture based on the provided static analysis and vulnerability history. A significant positive is the complete absence of known CVEs and a robust approach to SQL injection prevention, with 100% of queries utilizing prepared statements. The high percentage of properly escaped output further reduces the risk of cross-site scripting vulnerabilities. The plugin also demonstrates good practice by implementing nonce and capability checks on its identified entry points, ensuring that its two AJAX handlers are protected from unauthorized access.

However, the static analysis does reveal a notable concern: the presence of five instances of the `exec` function. While the data doesn't indicate specific exploitation paths in the taint analysis, the use of `exec` is inherently risky as it allows for the execution of arbitrary commands on the server. This function should be used with extreme caution and only after rigorous sanitization of any user-supplied input. The limited attack surface and lack of critical taint flows are positive indicators, but the `exec` function warrants careful consideration and potential further investigation. The plugin's lack of vulnerability history is a good sign, suggesting a history of secure development, but it doesn't negate the inherent risks associated with potentially dangerous functions.

Key Concerns

  • Use of 'exec' function
Vulnerabilities
None known

BaseCloud Shield Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

BaseCloud Shield Release Timeline

v2.0.0
v1.7.2
v1.7.1
v1.7.0
v1.6.9
v1.6.8
v1.6.7
v1.6.6
v1.6.5
v1.6.4
v1.6.3
v1.6.2
v1.6.1
v1.6.0
v1.5.2
v1.5.1
v1.5.0
v1.4.5Current
v1.4.3
v1.4.2
Code Analysis
Analyzed Apr 16, 2026

BaseCloud Shield Code Analysis

Dangerous Functions
5
Raw SQL Queries
0
1 prepared
Unescaped Output
11
163 escaped
Nonce Checks
3
Capability Checks
2
File Operations
7
External Requests
5
Bundled Libraries
0

Dangerous Functions Found

execexec('git add .', $output, $return_code);deploy.php:93
execexec("git commit -m \"{$commit_message}\"", $output, $return_code);deploy.php:102
execexec("git tag v{$new_version}", $output, $return_code);deploy.php:110
execexec('git push origin main', $output, $return_code);deploy.php:119
execexec("git push origin v{$new_version}", $output, $return_code);deploy.php:126

SQL Query Safety

100% prepared1 total queries

Output Escaping

94% escaped174 total outputs
Attack Surface

BaseCloud Shield Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_bcshield_unlock_ipbasecloud-shield.php:61
authwp_ajax_bcshield_clear_logsbasecloud-shield.php:62
WordPress Hooks 9
actionadmin_menubasecloud-shield.php:46
actionadmin_initbasecloud-shield.php:47
actionadmin_enqueue_scriptsbasecloud-shield.php:48
filterwp_authenticate_userbasecloud-shield.php:51
actioninitbasecloud-shield.php:52
actionwp_enqueue_scriptsbasecloud-shield.php:53
actionwp_login_failedbasecloud-shield.php:56
filterauthenticatebasecloud-shield.php:57
filterlogin_errorsbasecloud-shield.php:58
Maintenance & Trust

BaseCloud Shield Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 27, 2026
PHP min version7.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

BaseCloud Shield Developer Profile

BaseCloud

3 plugins · 80 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect BaseCloud Shield

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/basecloud-shield/admin/css/admin-styles.css/wp-content/plugins/basecloud-shield/admin/js/admin-scripts.js/wp-content/plugins/basecloud-shield/public/css/frontend-styles.css
Script Paths
/wp-content/plugins/basecloud-shield/admin/js/admin-scripts.js/wp-content/plugins/basecloud-shield/public/js/frontend-scripts.js
Version Parameters
basecloud-shield/admin/css/admin-styles.css?ver=basecloud-shield/admin/js/admin-scripts.js?ver=basecloud-shield/public/css/frontend-styles.css?ver=basecloud-shield/public/js/frontend-scripts.js?ver=

HTML / DOM Fingerprints

CSS Classes
bcshield-admin-wrapbcshield-settings-sectionbcshield-tabbcshield-otp-form-containerbcshield-otp-form
HTML Comments
<!-- BaseCloud Shield Admin Settings --><!-- BaseCloud Shield OTP Form --><!-- BaseCloud Shield Security Lockout -->
Data Attributes
data-bcshield-otp-formdata-bcshield-lockout
JS Globals
bcshield_ajax_object
REST Endpoints
/wp-json/bcshield/v1/unlock_ip/wp-json/bcshield/v1/clear_logs
Shortcode Output
[bcshield_otp_form][bcshield_lockout_message]
FAQ

Frequently Asked Questions about BaseCloud Shield