
Force User Login Multisite Security & Risk Analysis
wordpress.org/plugins/force-user-login-multisiteMakes your wordpress blog private unless the user is logged in, optionally setting a minium user level. Modified from http://wordpress.
Is Force User Login Multisite Safe to Use in 2026?
Generally Safe
Score 85/100Force User Login Multisite has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'force-user-login-multisite' plugin v1.2.1 exhibits a mixed security posture. On the positive side, there are no reported CVEs, no dangerous functions, no raw SQL queries, no file operations, and no external HTTP requests, indicating a generally clean codebase in these areas. The complete absence of an attack surface (AJAX, REST API, shortcodes, cron events) is also a significant strength, as it limits potential entry points for attackers. Furthermore, the presence of capability checks suggests some level of access control is being implemented.
However, there are notable concerns. The static analysis reveals that 100% of the identified outputs are not properly escaped. This is a significant risk, as it can lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is reflected directly in the output. Additionally, the taint analysis identified one flow with unsanitized paths, which, while not classified as critical or high severity in this analysis, still represents a potential security weakness that warrants investigation. The absence of nonce checks on entry points (though the attack surface is zero) would normally be a concern, but in this specific case, with no entry points, it's a non-issue. The plugin's vulnerability history being completely clean is a good sign, but the lack of proper output escaping and the identified unsanitized path in the taint analysis suggest that the plugin may not have undergone extensive security scrutiny or that its current security practices are not entirely robust. Overall, while the plugin has strengths in limiting its attack surface and avoiding certain common vulnerabilities, the unescaped output and unsanitized path are significant weaknesses that reduce its security score.
Key Concerns
- Output not properly escaped
- Flow with unsanitized paths
Force User Login Multisite Security Vulnerabilities
Force User Login Multisite Code Analysis
Output Escaping
Data Flow Analysis
Force User Login Multisite Attack Surface
WordPress Hooks 2
Maintenance & Trust
Force User Login Multisite Maintenance & Trust
Maintenance Signals
Community Trust
Force User Login Multisite Alternatives
My Private Site
jonradio-private-site
Make your WordPress site private with one click for family, projects, or teams. Protection for content, login, and registration.
Chap Secure Password Login
chap-secure-login
Do not show password, during login, on an insecure channel (without SSL). Use a SHA-256 hash algorithm.
Private Suite
private-suite
Allows you to choose who can read private content and offers better control of privacy features.
Force login to make the site private – Gozer
gozer
Force visitors to log in before accessing your site with extensive exception controls.
Encrypt My Login Password
encrypt-my-login-password
Do not show password on login page.
Force User Login Multisite Developer Profile
11 plugins · 390 total installs
How We Detect Force User Login Multisite
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
wrapform-tablename="force_login_multisite_minlevel"id="force_login_multisite_minlevel"