Prevent Brute Force Login Security & Risk Analysis

wordpress.org/plugins/ervan-limit-login

Limit the number of login attempts by ip address.

10 active installs v1.1.0 PHP 5.6.3+ WP 4.9+ Updated Jan 25, 2020
brute-forcelockoutloginprevent-brute-forceprevent-brute-force-login
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Prevent Brute Force Login Safe to Use in 2026?

Generally Safe

Score 85/100

Prevent Brute Force Login has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "ervan-limit-login" v1.1.0 plugin exhibits a generally good security posture with a limited attack surface and no known historical vulnerabilities. The static analysis reveals a complete lack of AJAX handlers, REST API routes, shortcodes, and cron events, meaning there are no obvious public entry points into the plugin's functionality. Furthermore, all detected SQL queries utilize prepared statements, which is a strong indicator of secure database interaction. The absence of file operations and external HTTP requests also contributes positively to its security profile.

However, there are notable areas of concern. The plugin utilizes the `unserialize` function three times, which can be a significant security risk if the serialized data originates from untrusted sources. While the taint analysis shows only one flow with an unsanitized path and no critical or high severity issues, the presence of `unserialize` without clear sanitization or authentication checks on its input is a potential vulnerability. Additionally, the plugin has zero nonce checks and zero capability checks, meaning that functionality, if any were exposed, would not be adequately protected against unauthorized access or cross-site request forgery. The output escaping is also only moderately effective, with over a third of outputs not properly escaped, which could lead to cross-site scripting vulnerabilities.

Given the lack of historical vulnerabilities, it's possible that the `unserialize` function is used with data that is internally generated or otherwise controlled in a way that mitigates risk. However, the absence of authentication and nonce checks coupled with the use of `unserialize` and imperfect output escaping presents a potential risk. The plugin's strengths lie in its limited attack surface and secure database practices, but these are overshadowed by the potential for deserialization vulnerabilities and the lack of basic security checks.

Key Concerns

  • Dangerous function 'unserialize' used
  • Flow with unsanitized path detected
  • No nonce checks
  • No capability checks
  • Output escaping only 67% proper
Vulnerabilities
None known

Prevent Brute Force Login Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Prevent Brute Force Login Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Prevent Brute Force Login Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
8 prepared
Unescaped Output
14
28 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$whitelists_ip = ( isset( $locked_user->whitelists_ip ) ) ? (array) @unserialize( $locked_user->whitincludes/lockdown.php:52
unserialize$whitelists_ip = ( isset( $locked_user->whitelists_ip ) ) ? (array) unserialize( $locked_user->whiteincludes/lockdown.php:171
unserialize$whitelists_ip = ( isset( $locked_user->whitelists_ip ) ) ? (array) @unserialize( $locked_user->whitincludes/lockdown.php:263

SQL Query Safety

100% prepared8 total queries

Output Escaping

67% escaped42 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<unlock-request> (includes/forms/unlock-request.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Prevent Brute Force Login Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menuincludes/admin/settings.php:24
actionadmin_initincludes/admin/settings.php:25
filterauthenticateincludes/lockdown.php:21
actioninitincludes/lockdown.php:22
actioninitprevent-brute-force-login.php:123
Maintenance & Trust

Prevent Brute Force Login Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedJan 25, 2020
PHP min version5.6.3
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Prevent Brute Force Login Developer Profile

ervannur

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Prevent Brute Force Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ervan-limit-login/includes/api/api-helpers.php/wp-content/plugins/ervan-limit-login/includes/lockdown.php/wp-content/plugins/ervan-limit-login/includes/notification.php/wp-content/plugins/ervan-limit-login/includes/admin/settings.php
Version Parameters
ervan-limit-login/style.css?ver=prevent-brute-force-login/assets/css/style.css?ver=prevent-brute-force-login/assets/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
kdbm_pbfl_admin_settings
HTML Comments
<!-- KDBM PBFL Admin Settings --><!-- This is the main file for the plugin --><!-- Basic Settings --><!-- Email Settings -->+11 more
Data Attributes
data-kdbm-pbfl-nonce
JS Globals
kdbm_pbfl_paramsKDBM_PBFL_AJAX_URL
REST Endpoints
/wp-json/kdbm_pbfl/v1/settings/wp-json/kdbm_pbfl/v1/lockouts/wp-json/kdbm_pbfl/v1/logs
Shortcode Output
[kdbm_pbfl_login_form][kdbm_pbfl_lockout_message]
FAQ

Frequently Asked Questions about Prevent Brute Force Login