Code9 Security & Risk Analysis

wordpress.org/plugins/code9

Code9 2-step verification code for users. utility tool for wordpress. lightweight and high performance.

10 active installs v1.0.13 PHP 5.6.4+ WP 4.1+ Updated May 3, 2023
2-step-login2fatwo-step-authenticationverification-passwordwordpress-authentication
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Code9 Safe to Use in 2026?

Generally Safe

Score 85/100

Code9 has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "code9" v1.0.13 plugin presents a significant security risk due to a large number of unprotected AJAX handlers. While the plugin demonstrates good practices in its handling of SQL queries and avoids dangerous functions, file operations, and external HTTP requests, the absence of authentication and capability checks on all its AJAX entry points is a major concern. This leaves the plugin vulnerable to unauthorized access and potential malicious manipulation by any authenticated user on the WordPress site.

The static analysis revealed a concerning pattern where 100% of the analyzed taint flows had unsanitized paths. Although these flows were not classified as critical or high severity, the presence of numerous unsanitized paths on all entry points suggests a general lack of robust input validation. Furthermore, the extremely low percentage of properly escaped output (4%) indicates a high likelihood of cross-site scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website.

The plugin's vulnerability history is clean, with no recorded CVEs. This, combined with the absence of critical or high-severity taint flows, might suggest that the plugin has not yet been targeted or that past vulnerabilities were promptly addressed. However, the identified issues in the static analysis, particularly the unprotected AJAX endpoints and poor output escaping, create a fertile ground for new vulnerabilities. The overall security posture is weakened by the lack of essential security controls on its primary attack vectors, despite strengths in other areas.

Key Concerns

  • 8 AJAX handlers without auth checks
  • 4% properly escaped output
  • 9 flows with unsanitized paths
  • 0 Nonce checks on AJAX
  • 0 Capability checks
Vulnerabilities
None known

Code9 Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Code9 Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Code9 Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
22
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

4% escaped23 total outputs
Data Flows · Security
9 unsanitized

Data Flow Analysis

9 flows9 with unsanitized paths
code9_security_2_step_middleware (function/code9_security.php:53)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
8 unprotected

Code9 Attack Surface

Entry Points8
Unprotected8

AJAX Handlers 8

authwp_ajax_security_2_step_blockingtime_updateplugin/security/api/security_2_step_blockingtime_update.php:19
authwp_ajax_security_2_step_getplugin/security/api/security_2_step_get.php:13
authwp_ajax_security_2_step_key_iv_resetplugin/security/api/security_2_step_key_iv_reset.php:17
authwp_ajax_security_2_step_updateplugin/security/api/security_2_step_update.php:18
authwp_ajax_security_anti_brute_force_blocked_removeplugin/security/api/security_anti_brute_force_blocked_remove.php:17
authwp_ajax_security_anti_brute_force_logs_getplugin/security/api/security_anti_brute_force_logs_get.php:15
authwp_ajax_security_anti_brute_force_updateplugin/security/api/security_anti_brute_force_update.php:18
authwp_ajax_spa_securityplugin/security/spa.php:28
WordPress Hooks 11
actioninitcode9.php:28
actionwp_loginfunction/code9_anti_brute_foce.php:15
filterauthenticatefunction/code9_anti_brute_foce.php:268
actionadmin_initfunction/code9_api.php:27
actionadmin_menufunction/code9_menu_page_register.php:18
actionauth_redirectfunction/code9_security.php:457
actionclear_auth_cookiefunction/code9_security.php:467
actionedit_user_profilefunction/code9_security.php:518
actionshow_user_profilefunction/code9_security.php:519
actionpersonal_options_updatefunction/code9_security.php:528
actionedit_user_profile_updatefunction/code9_security.php:529
Maintenance & Trust

Code9 Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedMay 3, 2023
PHP min version5.6.4
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Code9 Developer Profile

Code9fair

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Code9

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/code9/assets/code9.css/wp-content/plugins/code9/assets/mermaid.min.css/wp-content/plugins/code9/assets/spa.js/wp-content/plugins/code9/assets/gridjs.umd.js/wp-content/plugins/code9/assets/language.js/wp-content/plugins/code9/assets/crypto-js.min.js/wp-content/plugins/code9/assets/aes.min.js/wp-content/plugins/code9/assets/crypto.js+17 more
Script Paths
/wp-content/plugins/code9/assets/spa.js/wp-content/plugins/code9/assets/gridjs.umd.js/wp-content/plugins/code9/assets/language.js/wp-content/plugins/code9/assets/crypto-js.min.js/wp-content/plugins/code9/assets/aes.min.js/wp-content/plugins/code9/assets/crypto.js+12 more
Version Parameters
code9.css?ver=1.0.1

HTML / DOM Fingerprints

CSS Classes
c9-margin-bottom-smallc9-titlec9-logoc9-gridc9-sidec9-width-auto@mc9-width-1-1c9-side-middle+4 more
Data Attributes
data-link
JS Globals
C9_WP
FAQ

Frequently Asked Questions about Code9