External Database Authentication Reloaded Security & Risk Analysis

wordpress.org/plugins/external-db-auth-reloaded

A plugin that allows the use of an external database (MySQL, PostgreSQL, MSSQL, and more) for authentication into WordPress.

40 active installs v1.2.3 PHP + WP 3.1+ Updated May 31, 2015
authenticationdatabaseloginmssqlmysql
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is External Database Authentication Reloaded Safe to Use in 2026?

Generally Safe

Score 85/100

External Database Authentication Reloaded has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The external-db-auth-reloaded plugin, version 1.2.3, exhibits a mixed security posture. On the positive side, the static analysis reveals no identified critical or high-severity issues within the code itself. There are no detected dangerous functions, file operations, external HTTP requests, or taint flows indicating potential vulnerabilities. The attack surface also appears minimal, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events without appropriate checks.

However, there are significant concerns regarding output escaping. The analysis shows that 100% of the 35 identified output operations are not properly escaped. This presents a substantial risk of cross-site scripting (XSS) vulnerabilities, where malicious code could be injected and executed in the user's browser. Additionally, while the plugin uses prepared statements for a majority of its SQL queries (54%), the remaining 46% are not prepared, potentially opening the door to SQL injection vulnerabilities. The absence of nonce and capability checks across all entry points further exacerbates these risks by not enforcing proper authorization and security measures.

The plugin's vulnerability history is clean, with no recorded CVEs. This is a positive indicator, but it does not mitigate the risks identified in the current static analysis. The lack of previously disclosed vulnerabilities might suggest a lower profile or a history of good security practices, but the current code analysis highlights significant areas for improvement, particularly in output escaping and SQL query sanitization. Overall, while the plugin has a clean CVE history and a limited attack surface, the critical lack of output escaping and incomplete SQL query preparation represent immediate and serious security risks.

Key Concerns

  • 0% output escaping
  • 46% of SQL queries not prepared
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

External Database Authentication Reloaded Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

External Database Authentication Reloaded Code Analysis

Dangerous Functions
0
Raw SQL Queries
6
7 prepared
Unescaped Output
35
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

54% prepared13 total queries

Output Escaping

0% escaped35 total outputs
Attack Surface

External Database Authentication Reloaded Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
actionplugins_loadedexternal_db_auth.php:594
actionadmin_initexternal_db_auth.php:595
actionadmin_menuexternal_db_auth.php:596
actionwp_authenticateexternal_db_auth.php:597
actionlost_passwordexternal_db_auth.php:598
actionregister_formexternal_db_auth.php:600
actionretrieve_passwordexternal_db_auth.php:601
actionpassword_resetexternal_db_auth.php:602
actionprofile_personal_optionsexternal_db_auth.php:603
filterlogin_errorsexternal_db_auth.php:604
filtershow_password_fieldsexternal_db_auth.php:605
filterlogin_messageexternal_db_auth.php:606
Maintenance & Trust

External Database Authentication Reloaded Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedMay 31, 2015
PHP min version
Downloads11K

Community Trust

Rating100/100
Number of ratings2
Active installs40
Developer Profile

External Database Authentication Reloaded Developer Profile

Joshua Parker

5 plugins · 130 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect External Database Authentication Reloaded

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/external-db-auth-reloaded/external_db_auth.php

HTML / DOM Fingerprints

Data Attributes
name="external_db_type"name="external_host"name="external_db_port"name="external_db"name="external_db_user"name="external_db_pw"+18 more
FAQ

Frequently Asked Questions about External Database Authentication Reloaded