BruteGuard – Brute Force Login Protection Security & Risk Analysis

wordpress.org/plugins/bruteguard

BruteGuard is a cloud powered brute force login protection that shields your site against botnet attacks.

200 active installs v0.1.4 PHP + WP 4.4+ Updated Oct 9, 2022
brute-forcebrute-force-attackbruteforceloginsecurity
64
C · Use Caution
CVEs total1
Unpatched1
Last CVEApr 17, 2025
Safety Verdict

Is BruteGuard – Brute Force Login Protection Safe to Use in 2026?

Use With Caution

Score 64/100

BruteGuard – Brute Force Login Protection has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Apr 17, 2025Updated 3yr ago
Risk Assessment

The bruteguard plugin v0.1.4 presents a mixed security posture. On the positive side, the static analysis reveals a very limited attack surface, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that lack authentication or permission checks. The absence of dangerous functions and file operations is also a strong indicator of good coding practices in those areas. However, the plugin exhibits weaknesses in output escaping, with less than half of its outputs being properly escaped, suggesting a potential for cross-site scripting vulnerabilities. The use of external HTTP requests also warrants attention, as these can sometimes be vectors for attack if not handled carefully.

The vulnerability history is a significant concern. The presence of one known medium-severity CVE, specifically related to Cross-site Scripting, which is also currently unpatched, indicates a direct and actionable security risk. The fact that the last vulnerability was recent further emphasizes the need for immediate attention to this known issue. While the plugin doesn't show critical or high severity vulnerabilities in its history or taint analysis, the unpatched medium CVE coupled with the poor output escaping metrics points to a real and present danger to sites using this plugin.

In conclusion, while bruteguard v0.1.4 has a small attack surface and avoids certain risky coding practices, the unpatched cross-site scripting vulnerability and the high percentage of improperly escaped output are critical weaknesses. The plugin's security is significantly undermined by the known, unaddressed vulnerability. Users should be strongly advised to either ensure this vulnerability is patched or to refrain from using this version of the plugin.

Key Concerns

  • Unpatched Medium CVE
  • Low Output Escaping Percentage
  • SQL queries not fully prepared
Vulnerabilities
1 published

BruteGuard – Brute Force Login Protection Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-39408medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

BruteGuard – Brute Force Login Protection <= 0.1.4 - Reflected Cross-Site Scripting

Apr 17, 2025Unpatched
Version History

BruteGuard – Brute Force Login Protection Release Timeline

v0.1.4Current1 CVE
v0.1.31 CVE
v0.1.21 CVE
v0.1.11 CVE
v0.1.01 CVE
Code Analysis
Analyzed Mar 16, 2026

BruteGuard – Brute Force Login Protection Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
1 prepared
Unescaped Output
13
11 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
3
Bundled Libraries
0

SQL Query Safety

50% prepared2 total queries

Output Escaping

46% escaped24 total outputs
Attack Surface

BruteGuard – Brute Force Login Protection Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menuclasses\admin.class.php:7
actionadmin_initclasses\admin.class.php:8
actionadmin_initclasses\admin.class.php:9
actionwp_version_checkclasses\admin.class.php:11
filterauthenticateclasses\bruteguard.class.php:18
actionwp_login_failedclasses\bruteguard.class.php:19
actionadmin_initclasses\bruteguard.class.php:20
Maintenance & Trust

BruteGuard – Brute Force Login Protection Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedOct 9, 2022
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings2
Active installs200
Developer Profile

BruteGuard – Brute Force Login Protection Developer Profile

EverPress

28 plugins · 120K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
255 days
View full developer profile
Detection Fingerprints

How We Detect BruteGuard – Brute Force Login Protection

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/bruteguard/assets/css/admin.css/wp-content/plugins/bruteguard/assets/js/admin.js
Script Paths
/wp-content/plugins/bruteguard/assets/js/admin.js
Version Parameters
bruteguard-adminbruteguard

HTML / DOM Fingerprints

CSS Classes
bruteguard-apikey-fieldbruteguard-email-fieldbruteguard-emailbruteguard-email-submit
Data Attributes
data-key
JS Globals
bruteguard
FAQ

Frequently Asked Questions about BruteGuard – Brute Force Login Protection