BruteFort Security & Risk Analysis

wordpress.org/plugins/brutefort

BruteFort – Complete WordPress login security with custom login URLs, geo blocking, brute force protection, and IP restrictions in one plugin.

0 active installs v0.0.7 PHP 7.4+ WP 5.0+ Updated Nov 19, 2025
brute-forcecustom-login-urlgeo-blockingip-restrictionlogin-protection
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is BruteFort Safe to Use in 2026?

Generally Safe

Score 100/100

BruteFort has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The 'brutefort' plugin v0.0.7 exhibits a generally good security posture in its static analysis. The complete absence of dangerous functions, the high percentage of SQL queries using prepared statements, and the 100% proper output escaping are positive indicators. The plugin also correctly uses nonce checks and capability checks for a significant portion of its operations. There are no recorded vulnerabilities (CVEs) for this plugin, suggesting a history of secure development or a lack of historical scrutiny.

However, the plugin presents a notable security concern due to its attack surface. It exposes two REST API routes without any permission callbacks, meaning any user, including unauthenticated ones, could potentially interact with these endpoints. This lack of authorization on the exposed REST API routes is the primary risk identified. While taint analysis shows no critical or high severity issues, the exposed REST API routes represent a potential entry point for unauthorized actions if not properly secured within the plugin's logic.

In conclusion, while the 'brutefort' plugin demonstrates good internal coding practices regarding SQL and output sanitization, the open nature of its REST API endpoints is a significant weakness. The absence of historical vulnerabilities is a positive sign, but it does not mitigate the immediate risk posed by the unprotected entry points.

Key Concerns

  • REST API routes exposed without permission callbacks
  • Unprotected REST API entry points
Vulnerabilities
None known

BruteFort Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

BruteFort Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
21 prepared
Unescaped Output
0
24 escaped
Nonce Checks
1
Capability Checks
6
File Operations
1
External Requests
1
Bundled Libraries
0

SQL Query Safety

95% prepared22 total queries

Output Escaping

100% escaped24 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
show_admin_notices (brutefort.php:274)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

BruteFort Attack Surface

Entry Points2
Unprotected2

REST API Routes 2

GET/wp-json/brutefort/v1/geo-settingsincludes\Routes\GeoRoutes.php:37
GET/wp-json/brutefort/v1/login-url-settingsincludes\Routes\LoginUrlRoutes.php:37
WordPress Hooks 21
filterdoing_it_wrong_trigger_errorbrutefort.php:68
actioninitbrutefort.php:168
filterplugin_row_metabrutefort.php:170
actionadmin_noticesbrutefort.php:267
actionactivate_brutefort/brutefort.phpincludes\helpers.php:39
actiondeactivate_brutefort/brutefort.phpincludes\helpers.php:40
actionrest_api_initincludes\Routes\Routes.php:26
filterauthenticateincludes\Security\LoginGuard.php:115
actionwp_login_failedincludes\Security\LoginGuard.php:116
actionwp_loginincludes\Security\LoginGuard.php:117
actioninitincludes\Services\LoginUrlService.php:26
filterquery_varsincludes\Services\LoginUrlService.php:27
actionparse_requestincludes\Services\LoginUrlService.php:28
filtersite_urlincludes\Services\LoginUrlService.php:29
filternetwork_site_urlincludes\Services\LoginUrlService.php:30
filterwp_redirectincludes\Services\LoginUrlService.php:31
actionlogin_initincludes\Services\LoginUrlService.php:32
actionadmin_menuincludes\Settings.php:24
actionadmin_enqueue_scriptsincludes\Settings.php:25
actionplugins_loadedincludes\Settings.php:26
actionadmin_initincludes\Settings.php:27
Maintenance & Trust

BruteFort Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedNov 19, 2025
PHP min version7.4
Downloads289

Community Trust

Rating100/100
Number of ratings3
Active installs0
Developer Profile

BruteFort Developer Profile

Yoyal Limbu

2 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect BruteFort

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/brutefort/assets/css/brutefort.css/wp-content/plugins/brutefort/assets/js/brutefort.js
Script Paths
/wp-content/plugins/brutefort/assets/js/brutefort.js
Version Parameters
brutefort/assets/css/brutefort.css?ver=brutefort/assets/js/brutefort.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about BruteFort