
Elevation Magic Link Login Security & Risk Analysis
wordpress.org/plugins/elevation-magic-linkAdd a secure, passwordless login option to the default WordPress login form.
Is Elevation Magic Link Login Safe to Use in 2026?
Generally Safe
Score 100/100Elevation Magic Link Login has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "elevation-magic-link" v1.2.2 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any recorded vulnerabilities (CVEs) in its history is a significant positive indicator, suggesting a history of responsible development and maintenance. The attack surface is commendably zero, with no AJAX handlers, REST API routes, shortcodes, or cron events exposed, greatly minimizing potential entry points for attackers. Furthermore, the code demonstrates good practices in handling SQL queries, with 100% using prepared statements, which effectively mitigates SQL injection risks. The presence of a nonce check is also a positive sign for security awareness.
However, there are areas for improvement that temper the otherwise positive assessment. The most notable concern is that only 50% of output escaping is properly implemented. This means that potentially sensitive data outputted by the plugin could be vulnerable to Cross-Site Scripting (XSS) attacks if user-supplied data is not correctly sanitized before display. The absence of capability checks is also a weakness, as it implies that any user, regardless of their role or permissions, could potentially interact with or trigger plugin functionality if an entry point were discovered. While taint analysis showed no issues, this is likely due to the very limited attack surface, and it doesn't negate the XSS risk identified in output escaping.
In conclusion, the plugin is largely secure due to its minimal attack surface and secure SQL practices. The lack of historical vulnerabilities is encouraging. Nevertheless, the inconsistent output escaping and the absence of capability checks represent potential security weaknesses that should be addressed to achieve a more robust security profile. The plugin has a solid foundation but requires attention to specific output sanitization and permission enforcement for comprehensive security.
Key Concerns
- Output escaping is only 50% proper
- No capability checks found
Elevation Magic Link Login Security Vulnerabilities
Elevation Magic Link Login Code Analysis
Output Escaping
Elevation Magic Link Login Attack Surface
WordPress Hooks 5
Maintenance & Trust
Elevation Magic Link Login Maintenance & Trust
Maintenance Signals
Community Trust
Elevation Magic Link Login Alternatives
LoginEase
loginease
Passwordless login via secure magic links on the WordPress login form.
Login by Magic
magiclabs
Login by Magic plugin replaces the standard WordPress login form with one powered by Magic that enables passwordless email magic link login.
Dolutech Passwordless Login
dolutech-passwordless-login
Permite login seguro sem senha com tecnologia passwordless e autenticação de dois fatores (2FA) via TOTP.
All-In-One Security (AIOS) – Security and Firewall
all-in-one-wp-security-and-firewall
Protect your website investment with All-In-One Security (AIOS) – a comprehensive and easy to use security plugin designed especially for WordPress.
Limit Login Attempts
limit-login-attempts
Limit rate of login attempts, including by way of cookies, for each IP. Fully customizable.
Elevation Magic Link Login Developer Profile
3 plugins · 0 total installs
How We Detect Elevation Magic Link Login
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/elevation-magic-link/elevation-magic-link.phpelevation-magic-link/style.css?ver=1.2.2elevation-magic-link/script.js?ver=1.2.2HTML / DOM Fingerprints
emll-containeremll-textemll-full-width-btnemll-messageView 1: Initial Toggle ButtonView 2: Magic Link Submission (Hidden by default via CSS)Hidden input to act as the actual triggerid="emll-view-toggle"id="emll-toggle-btn"id="emll-view-submit"id="emll-submit-btn"id="emll-back-btn"name="emll_request_magic"+1 moredocument.addEventListenerwindow.login_error