Force User Login Security & Risk Analysis

wordpress.org/plugins/force-user-login-modified

A very small plugin that forces users to login to view blog content.

40 active installs v1.0 PHP + WP 2.0.2+ Updated Aug 28, 2015
force-user-loginloginpasswordprivacy
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Force User Login Safe to Use in 2026?

Generally Safe

Score 85/100

Force User Login has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "force-user-login-modified" v1.0 plugin exhibits a seemingly strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface. Furthermore, the code signals indicate a lack of dangerous functions, proper SQL statement preparation, output escaping, file operations, external HTTP requests, nonce checks, and capability checks. This suggests a deliberate effort to avoid common vulnerabilities. However, the taint analysis reveals four flows with unsanitized paths, all of which were flagged as having no severity. This is a peculiar finding and warrants closer inspection to understand why these paths were not deemed a risk despite being unsanitized.

The vulnerability history shows no known CVEs for this plugin, which is a positive indicator of its current security status. The absence of any recorded vulnerabilities, common or otherwise, and the lack of recent issues further contribute to an impression of stability. Despite the positive indicators, the presence of unsanitized paths in the taint analysis, even without a reported severity, introduces a degree of uncertainty. A truly robust security posture would ideally have zero unsanitized paths. Therefore, while the plugin demonstrates good practices in many areas and lacks known vulnerabilities, the unexplained unsanitized paths represent a potential area for deeper investigation.

Key Concerns

  • Flows with unsanitized paths
Vulnerabilities
None known

Force User Login Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Force User Login Release Timeline

v1.0.2
v1.0.1
v1.0Current
Code Analysis
Analyzed Apr 16, 2026

Force User Login Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Data Flows · Security
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
force_login (force_login.php:34)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Force User Login Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actiontemplate_redirectforce_login.php:32
actiontemplate_redirecttrunk/force_login.php:33
Maintenance & Trust

Force User Login Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedAug 28, 2015
PHP min version
Downloads8K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

Force User Login Developer Profile

smatric

1 plugin · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Force User Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Force User Login