[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$feO5iUoF4RRRBbjFZgXNmGPlGTek5jHViSJ9xurU11OM":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":16,"requires_php":17,"tags":18,"homepage":23,"download_link":24,"security_score":25,"vuln_count":13,"unpatched_count":13,"last_vuln_date":26,"fetched_at":27,"vulnerabilities":28,"developer":29,"crawl_stats":26,"alternatives":36,"analysis":130,"fingerprints":175},"force-login-with-email","Force Login With Email","1.0.5","MarcosAlexandre","https:\u002F\u002Fprofiles.wordpress.org\u002Fmarcosalexandre\u002F","\u003Cp>Force Login With Email is a fork of the Email Login Auth plugin. It is a very simple WordPress plugin, which allows users to login with their account email address. Just install, activate it and try to re-login! You can also disable login with username for all users or for ‘admin’ only.\u003C\u002Fp>\n\u003Ch4>How to use\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>After installation, enable the plugin.\u003C\u002Fli>\n\u003Cli>Now you and your users will be able to login using their account e-mail address!\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Development\u003C\u002Fh3>\n\u003Cp>This version of the \u003Cstrong>Force Login With Email\u003C\u002Fstrong> plugin was developed without any connection with the previous developer and we count on your help to improve the code and operation of this plugin.\u003C\u002Fp>\n\u003Ch4>Compatibility\u003C\u002Fh4>\n\u003Cp>Compatible since version 4.0.x of WordPress.\u003Cbr \u002F>\nCompatible since version 3.0.x of WooCommerce.\u003C\u002Fp>\n\u003Ch3>Doubts?\u003C\u002Fh3>\n\u003Cp>You can ask questions by:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Using our \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fmarcos-alexandre82\u002Fforce-login-with-email\u002Fissues\u002F\" rel=\"nofollow ugc\">forum on Github\u003C\u002Fa>.\u003C\u002Fli>\n\u003Cli>Creating a topic in the \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fforce-login-with-email\u002F\" rel=\"ugc\">WordPress help forum\u003C\u002Fa>.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Credits\u003C\u002Fh4>\n\u003Cp>This plugin is a fork that implements internationalization and continues the excellent plugin developed by \u003Ca href=\"https:\u002F\u002Fprofiles.wordpress.org\u002Fmikk_cz\u002F\" rel=\"nofollow ugc\">Michal Stanke\u003C\u002Fa> in:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Femail-login-auth\u002F\" rel=\"ugc\">Email Login Auth\u003C\u002Fa>.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Banner:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fbr.freepik.com\u002Ffotos-vetores-gratis\u002Ffundo\u002F\" rel=\"nofollow ugc\">Freepik\u003C\u002Fa>.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Icon:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fbr.freepik.com\u002Ffotos-vetores-gratis\u002Fnegocio\u002F\" rel=\"nofollow ugc\">Freepik\u003C\u002Fa>.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Contributors\u003C\u002Fh4>\n\u003Cp>You can contribute source code on our page at \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fmarcos-alexandre82\u002Fforce-login-with-email\u002Fissues\u002F\" rel=\"nofollow ugc\">GitHub\u003C\u002Fa>.\u003C\u002Fp>\n","Enable login in WordPress only with user e-mail address.",200,8775,0,"2020-07-13T23:52:00.000Z","5.4.19","4.0","5.6",[19,20,21,22],"authentication","email","login","username","https:\u002F\u002Fgithub.com\u002Fmarcos-alexandre82\u002Fforce-login-with-email","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fforce-login-with-email.1.0.5.zip",85,null,"2026-03-15T15:16:48.613Z",[],{"slug":30,"display_name":7,"profile_url":8,"plugin_count":31,"total_installs":32,"avg_security_score":25,"avg_patch_time_days":33,"trust_score":34,"computed_at":35},"marcosalexandre",2,210,30,84,"2026-04-04T07:44:32.760Z",[37,59,75,94,114],{"slug":38,"name":39,"version":40,"author":41,"author_profile":42,"description":43,"short_description":44,"active_installs":45,"downloaded":46,"rating":47,"num_ratings":48,"last_updated":49,"tested_up_to":50,"requires_at_least":51,"requires_php":52,"tags":53,"homepage":56,"download_link":57,"security_score":58,"vuln_count":13,"unpatched_count":13,"last_vuln_date":26,"fetched_at":27},"duo-wordpress","Duo Two-Factor Authentication","2.5.7","Duo Security","https:\u002F\u002Fprofiles.wordpress.org\u002Fduosecurity\u002F","\u003Cp>Duo Security provides two-factor authentication as a service to protect against account takeover and data theft. Using the Duo plugin you can easily add Duo two-factor authentication to your WordPress website in just a few minutes!\u003C\u002Fp>\n\u003Cp>Rather than relying on a password alone, which can be phished or guessed, Duo’s authentication service adds a second layer of security to your WordPress accounts. Duo enables your admins or users to verify their identities using something they have—like their mobile phone or a hardware token—which provides strong authentication and dramatically enhances account security.\u003C\u002Fp>\n\u003Cp>Duo is easy to setup and use. With Duo there’s no extra hardware or complicated software to install, just sign up for Duo’s service and install the plugin. Then you can set which user roles you want to enable two-factor authentication for—admins, editors, authors, contributors, and\u002For subscribers—without setting up user accounts, directory synchronization, servers, or hardware.\u003C\u002Fp>\n\u003Cp>When they log in, your users have multiple ways they can authenticate, including:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>One-tap authentication using Duo’s mobile app (our fastest, easiest way to authenticate)\u003C\u002Fli>\n\u003Cli>One-time passcodes generated by Duo’s mobile app (works even with no cell coverage)\u003C\u002Fli>\n\u003Cli>One-time passcodes delivered to any SMS-enabled phone (works even with no cell coverage)\u003C\u002Fli>\n\u003Cli>Phone callback to any phone (mobile or landline!)\u003C\u002Fli>\n\u003Cli>One-time passcodes generated by an OATH-compliant hardware token (if you’re feeling all old school)\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Protect your WordPress website in minutes with Duo.\u003C\u002Fp>\n\u003Ch3>End of Support Notice\u003C\u002Fh3>\n\u003Cp>Support for the traditional Duo Prompt experience using the Duo WordPress plugin ended on September 30, 2024. Please use the new \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fduo-universal\u002F\" rel=\"ugc\">Duo Universal plugin for WordPress\u003C\u002Fa>. Read more about the End of Suppport and migration to the new plugin on our \u003Ca href=\"https:\u002F\u002Fduo.com\u002Fdocs\u002Fwordpress\" rel=\"nofollow ugc\">Duo for WordPress – Duo Universal Prompt\u003C\u002Fa> documentation page\u003C\u002Fp>\n","Easily add Duo Security two-factor authentication to your WordPress website. Enable two-factor authentication for your admins and\u002For users.",3000,185434,74,39,"2025-06-06T15:47:00.000Z","6.0.11","4.1","",[19,54,21,55,22],"authenticator","two-factor","http:\u002F\u002Fwordpress.org\u002Fextend\u002Fplugins\u002Fduo-wordpress\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fduo-wordpress.zip",100,{"slug":60,"name":61,"version":62,"author":63,"author_profile":64,"description":65,"short_description":66,"active_installs":67,"downloaded":68,"rating":58,"num_ratings":69,"last_updated":70,"tested_up_to":71,"requires_at_least":72,"requires_php":52,"tags":73,"homepage":52,"download_link":74,"security_score":58,"vuln_count":13,"unpatched_count":13,"last_vuln_date":26,"fetched_at":27},"no-login-by-email-address","No Login by Email Address","1.3.0","cubecolour","https:\u002F\u002Fprofiles.wordpress.org\u002Fnumeeja\u002F","\u003Cp>WordPress 4.5 added the ability to login using the registered user’s email address in place of the username. When this plugin is active, the ability to login using the email address in place of the username is removed, and the label of the input field is changed to reflect this.\u003C\u002Fp>\n","Removes the ability to login using the email address instead of the username.",1000,12156,4,"2025-06-23T10:03:00.000Z","6.8.5","4.9",[20,21,22],"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fno-login-by-email-address.1.3.0.zip",{"slug":76,"name":77,"version":78,"author":79,"author_profile":80,"description":81,"short_description":82,"active_installs":58,"downloaded":83,"rating":84,"num_ratings":85,"last_updated":86,"tested_up_to":87,"requires_at_least":88,"requires_php":52,"tags":89,"homepage":92,"download_link":93,"security_score":25,"vuln_count":13,"unpatched_count":13,"last_vuln_date":26,"fetched_at":27},"login-with-username-or-email","Login with Username or Email","2.7","BCS Website Solutions","https:\u002F\u002Fprofiles.wordpress.org\u002Fbcswpplugins\u002F","\u003Cp>Allow users to login with either Email Address or Username.\u003C\u002Fp>\n\u003Cp>Just install the Plugin, no coding experience required.\u003C\u002Fp>\n","Allow users to login with Email or Username while logging in to Wordpress.",6370,52,5,"2016-03-14T16:54:00.000Z","4.4.34","3.0.1",[20,21,90,91,22],"login-with-email-address","login-with-email-or-username","https:\u002F\u002Fwww.bcswebsitesolutions.com\u002Fdownloads\u002Flogin-with-username-or-email\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogin-with-username-or-email.2.7.zip",{"slug":95,"name":96,"version":97,"author":98,"author_profile":99,"description":100,"short_description":101,"active_installs":33,"downloaded":102,"rating":103,"num_ratings":104,"last_updated":105,"tested_up_to":71,"requires_at_least":106,"requires_php":107,"tags":108,"homepage":52,"download_link":113,"security_score":58,"vuln_count":13,"unpatched_count":13,"last_vuln_date":26,"fetched_at":27},"email-otp-login","Email OTP Login","1.0.0","Tushar Sharma","https:\u002F\u002Fprofiles.wordpress.org\u002Fricheal\u002F","\u003Cp>Email OTP Login adds an additional layer of security to your WordPress site by requiring users to verify an OTP sent to their email after entering their username and password. This ensures that only users with access to the registered email can log in.\u003C\u002Fp>\n\u003Cp>Features:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Email OTP verification during \u003Cstrong>login\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>OTP expires in 5 minutes (configurable).\u003C\u002Fli>\n\u003Cli>OTP stored securely using WordPress password hashing.\u003C\u002Fli>\n\u003Cli>Works with the default WordPress login form.\u003C\u002Fli>\n\u003Cli>Uses WordPress built-in \u003Ccode>wp_mail()\u003C\u002Fcode> function (works with SMTP plugins).\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>This plugin does \u003Cstrong>not modify WordPress core files\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cp>This plugin is free software: you can redistribute it and\u002For modify it under the terms of the GNU General Public License as published by the Free Software Foundation, version 2 or later.\u003C\u002Fp>\n\u003Cp>This plugin is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.\u003C\u002Fp>\n","Adds OTP (One-Time Password) verification after login for enhanced security in WordPress. OTP is sent to the user's email.",403,60,1,"2025-08-29T18:30:00.000Z","6.3","7.4",[109,21,110,111,112],"email-verification","otp","security","two-factor-authentication","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Femail-otp-login.1.0.0.zip",{"slug":115,"name":116,"version":117,"author":118,"author_profile":119,"description":120,"short_description":121,"active_installs":122,"downloaded":123,"rating":13,"num_ratings":13,"last_updated":124,"tested_up_to":125,"requires_at_least":72,"requires_php":52,"tags":126,"homepage":52,"download_link":129,"security_score":25,"vuln_count":13,"unpatched_count":13,"last_vuln_date":26,"fetched_at":27},"gp-user-login-with-email-id","Gp user Login With EMail-ID","1.0.1","Ganesh Paygude","https:\u002F\u002Fprofiles.wordpress.org\u002Fganeshpaygude\u002F","\u003Cp>Allow user to login with their Email ID OR Username.\u003C\u002Fp>\n\u003Cp>Major features in Gp user Login With EMail-ID include:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Setting option checkbox allow to Login with Email ID associated with the user account.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Arbitrary section\u003C\u002Fh3>\n\u003Ch3>A brief Markdown Example\u003C\u002Fh3>\n","Allow user to login with their Email ID.",10,1565,"2020-12-28T10:21:00.000Z","5.6.17",[127,19,20,128],"auth","email-login","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fgp-user-login-with-email-id.1.0.1.zip",{"attackSurface":131,"codeSignals":163,"taintFlows":170,"riskAssessment":171,"analyzedAt":174},{"hooks":132,"ajaxHandlers":159,"restRoutes":160,"shortcodes":161,"cronEvents":162,"entryPointCount":13,"unprotectedCount":13},[133,139,143,150,155],{"type":134,"name":135,"callback":136,"file":137,"line":138},"action","admin_init","register_force_login_with_email_plugin_settings","force-login-with-email-options.php",28,{"type":134,"name":140,"callback":141,"file":137,"line":142},"admin_menu","add_force_login_with_email_plugin_menu",29,{"type":144,"name":145,"callback":146,"priority":147,"file":148,"line":149},"filter","authenticate","force_login_with_email",20,"force-login-with-email.php",46,{"type":144,"name":151,"callback":152,"priority":153,"file":148,"line":154},"gettext","force_login_with_email_username_label",99,65,{"type":144,"name":156,"callback":157,"file":148,"line":158},"login_init","register_force_login_with_email_label",67,[],[],[],[],{"dangerousFunctions":164,"sqlUsage":165,"outputEscaping":167,"fileOperations":13,"externalRequests":13,"nonceChecks":13,"capabilityChecks":13,"bundledLibraries":169},[],{"prepared":13,"raw":13,"locations":166},[],{"escaped":13,"rawEcho":13,"locations":168},[],[],[],{"summary":172,"deductions":173},"The \"force-login-with-email\" v1.0.5 plugin exhibits a remarkably strong security posture based on the provided static analysis.  The absence of any detected dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, or nonce\u002Fcapability checks is a testament to good coding practices.  The attack surface is effectively zero, meaning there are no readily identifiable entry points for attackers to exploit.  Furthermore, the plugin has no known past vulnerabilities, which suggests a history of secure development and maintenance.",[],"2026-03-16T20:21:32.325Z",{"wat":176,"direct":181},{"assetPaths":177,"generatorPatterns":178,"scriptPaths":179,"versionParams":180},[],[],[],[],{"cssClasses":182,"htmlComments":183,"htmlAttributes":184,"restEndpoints":185,"jsGlobals":186,"shortcodeOutput":187},[],[],[],[],[],[]]