Email TFA Security & Risk Analysis

wordpress.org/plugins/email-tfa

Add an extra layer of security via two-factor authentication with email for WordPress logins.

0 active installs v1.0.3 PHP + WP 6.0.0+ Updated May 27, 2025
emailloginsecuritytwo-factor-authentication
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Email TFA Safe to Use in 2026?

Generally Safe

Score 100/100

Email TFA has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10mo ago
Risk Assessment

The "email-tfa" plugin v1.0.3 exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests is commendable. Notably, all identified SQL queries utilize prepared statements, and the vast majority of output is properly escaped, minimizing the risk of cross-site scripting (XSS) vulnerabilities.

The plugin also demonstrates good security practices by implementing nonce checks on 11 occasions and capability checks on 2. The attack surface, while consisting of 9 shortcodes, currently shows no unprotected entry points, which is a positive sign. Taint analysis reveals no unsanitized paths or critical/high severity flows, further indicating a secure coding approach.

The plugin's vulnerability history is completely clean, with no recorded CVEs of any severity. This suggests a commitment to security by the developers or a lack of past discovery of vulnerabilities. Overall, "email-tfa" v1.0.3 appears to be a well-secured plugin, adhering to many best practices. The primary area of potential concern would be the existence of shortcodes, although currently, they are not identified as an attack vector, their presence always warrants vigilance as they can sometimes lead to input validation issues if not handled carefully.

Vulnerabilities
None known

Email TFA Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Email TFA Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
76 escaped
Nonce Checks
11
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

97% escaped78 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
<general-settings-form> (templates\admin\general-settings-form.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Email TFA Attack Surface

Entry Points9
Unprotected0

Shortcodes 9

[EMAIL_TFA_CODE] src\InitTfa.php:151
[EMAIL_TFA_SUBJECT] src\InitTfa.php:152
[EMAIL_TFA_BODY] src\InitTfa.php:156
[EMAIL_TFA_USER_FIRST_NAME] src\InitTfa.php:157
[EMAIL_TFA_USER_LAST_NAME] src\InitTfa.php:161
[EMAIL_TFA_USER_DISPLAY_NAME] src\InitTfa.php:165
[EMAIL_TFA_USER_NICE_NAME] src\InitTfa.php:169
[EMAIL_TFA_USER_EMAIL] src\InitTfa.php:173
[EMAIL_TFA_USER_NAME] src\InitTfa.php:177
WordPress Hooks 14
actionadmin_menusrc\InitTfa.php:92
actionemail_tfa_render_tab_contentsrc\InitTfa.php:93
filterplugin_action_linkssrc\InitTfa.php:102
actionwp_loginsrc\InitTfa.php:113
actionlogin_form_email_tfa_verification_formsrc\InitTfa.php:114
actionlogin_form_email_tfa_expired_formsrc\InitTfa.php:121
actionlogin_form_email_tfa_verify_codesrc\InitTfa.php:128
actionlogin_messagesrc\InitTfa.php:135
actionlogin_formsrc\InitTfa.php:142
actionshow_user_profilesrc\InitTfa.php:184
actionedit_user_profilesrc\InitTfa.php:190
actionpersonal_options_updatesrc\InitTfa.php:196
actionedit_user_profile_updatesrc\InitTfa.php:202
actionadmin_enqueue_scriptssrc\InitTfa.php:208
Maintenance & Trust

Email TFA Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedMay 27, 2025
PHP min version
Downloads406

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Email TFA Developer Profile

Justin Norton

3 plugins · 80 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Email TFA

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/email-tfa/assets/css/admin.css/wp-content/plugins/email-tfa/assets/js/admin.js
Version Parameters
email-tfa/assets/css/admin.css?ver=email-tfa/assets/js/admin.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- Email TFA User Meta Field -->
Data Attributes
name="email_tfa_enabled"id="email_tfa_enabled"data-tfa-user-meta-id="email_tfa_enabled"
Shortcode Output
[EMAIL_TFA_CODE][EMAIL_TFA_SUBJECT][EMAIL_TFA_BODY][EMAIL_TFA_USER_FIRST_NAME]
FAQ

Frequently Asked Questions about Email TFA