Duo Two-Factor Authentication Security & Risk Analysis

wordpress.org/plugins/duo-wordpress

Easily add Duo Security two-factor authentication to your WordPress website. Enable two-factor authentication for your admins and/or users.

3K active installs v2.5.7 PHP + WP 4.1+ Updated Jun 6, 2025
authenticationauthenticatorlogintwo-factorusername
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Duo Two-Factor Authentication Safe to Use in 2026?

Generally Safe

Score 100/100

Duo Two-Factor Authentication has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11mo ago
Risk Assessment

The "duo-wordpress" plugin version 2.5.7 exhibits a generally strong security posture in several key areas. The complete absence of known CVEs and unpatched vulnerabilities in its history is a significant positive indicator, suggesting a well-maintained and audited codebase. Furthermore, the plugin utilizes prepared statements exclusively for SQL queries, mitigating the risk of SQL injection vulnerabilities. The limited attack surface with no unprotected entry points is also commendable.

However, the static analysis reveals areas for improvement. A notable concern is the relatively low percentage of properly escaped output (36%). This could potentially lead to cross-site scripting (XSS) vulnerabilities if unsanitized data is displayed to users. The presence of two taint flows with unsanitized paths, while not resulting in critical or high severity issues in this analysis, warrants investigation as it suggests potential pathways for malicious input to be processed without adequate sanitization. The lack of nonce and capability checks on its entry points, though currently comprising a small attack surface, leaves room for potential abuse should new entry points be introduced in the future.

In conclusion, "duo-wordpress" v2.5.7 benefits from a clean vulnerability history and secure data handling for SQL. The primary weaknesses lie in output escaping and the handling of unsanitized data paths, which, although not currently exploited, represent latent risks. Addressing these areas proactively would further enhance the plugin's security.

Key Concerns

  • Low percentage of properly escaped output
  • Taint flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Duo Two-Factor Authentication Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Duo Two-Factor Authentication Release Timeline

v2.5.5
v2.5.4
v2.5.3
v2.5.2
v2.5.1
v2.5
v2.4.1
v2.4
v2.3.1
v2.3
v2.2
v2.1
v2.0
v1.8.1
v1.8
v1.7
v1.6.2
v1.6.1
v1.6
v1.5.3
Code Analysis
Analyzed Mar 16, 2026

Duo Two-Factor Authentication Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
16
9 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
2
Bundled Libraries
0

Output Escaping

36% escaped25 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
duo_start_second_factor (duo_wordpress.php:205)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Duo Two-Factor Authentication Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
filterxmlrpc_enabledduo_wordpress.php:825
filterplugin_action_linksduo_wordpress.php:831
actioninitduo_wordpress.php:834
actionclear_auth_cookieduo_wordpress.php:836
filterauthenticateduo_wordpress.php:838
actionadmin_menuduo_wordpress.php:841
actionwpmu_optionsduo_wordpress.php:844
actionupdate_wpmu_optionsduo_wordpress.php:845
actionadmin_initduo_wordpress.php:847
Maintenance & Trust

Duo Two-Factor Authentication Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedJun 6, 2025
PHP min version
Downloads187K

Community Trust

Rating74/100
Number of ratings39
Active installs3K
Developer Profile

Duo Two-Factor Authentication Developer Profile

Duo Security

2 plugins · 5K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Duo Two-Factor Authentication

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/duo-wordpress/duo_web/Duo-Web-v2.min.js
Script Paths
/wp-content/plugins/duo-wordpress/duo_web/Duo-Web-v2.min.js
Version Parameters
duo_web/Duo-Web-v2.min.js?v=2

HTML / DOM Fingerprints

CSS Classes
iframe_divcenterHeader
Data Attributes
data-hostdata-sig-requestdata-post-actionid="duo_iframe"
FAQ

Frequently Asked Questions about Duo Two-Factor Authentication