Force User Login Multisite Security & Risk Analysis

wordpress.org/plugins/force-user-login-multisite

Makes your wordpress blog private unless the user is logged in, optionally setting a minium user level. Modified from http://wordpress.

20 active installs v1.2.1 PHP + WP 3.0.0+ Updated Oct 24, 2023
force-user-loginloginpasswordprivacyprivate
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Force User Login Multisite Safe to Use in 2026?

Generally Safe

Score 85/100

Force User Login Multisite has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The 'force-user-login-multisite' plugin v1.2.1 exhibits a mixed security posture. On the positive side, there are no reported CVEs, no dangerous functions, no raw SQL queries, no file operations, and no external HTTP requests, indicating a generally clean codebase in these areas. The complete absence of an attack surface (AJAX, REST API, shortcodes, cron events) is also a significant strength, as it limits potential entry points for attackers. Furthermore, the presence of capability checks suggests some level of access control is being implemented.

However, there are notable concerns. The static analysis reveals that 100% of the identified outputs are not properly escaped. This is a significant risk, as it can lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is reflected directly in the output. Additionally, the taint analysis identified one flow with unsanitized paths, which, while not classified as critical or high severity in this analysis, still represents a potential security weakness that warrants investigation. The absence of nonce checks on entry points (though the attack surface is zero) would normally be a concern, but in this specific case, with no entry points, it's a non-issue. The plugin's vulnerability history being completely clean is a good sign, but the lack of proper output escaping and the identified unsanitized path in the taint analysis suggest that the plugin may not have undergone extensive security scrutiny or that its current security practices are not entirely robust. Overall, while the plugin has strengths in limiting its attack surface and avoiding certain common vulnerabilities, the unescaped output and unsanitized path are significant weaknesses that reduce its security score.

Key Concerns

  • Output not properly escaped
  • Flow with unsanitized paths
Vulnerabilities
None known

Force User Login Multisite Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Force User Login Multisite Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
force_login (force-login-multisite.php:90)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Force User Login Multisite Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuforce-login-multisite.php:11
actiontemplate_redirectforce-login-multisite.php:89
Maintenance & Trust

Force User Login Multisite Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedOct 24, 2023
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

Force User Login Multisite Developer Profile

jamesdlow

11 plugins · 390 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
9 days
View full developer profile
Detection Fingerprints

How We Detect Force User Login Multisite

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrapform-table
Data Attributes
name="force_login_multisite_minlevel"id="force_login_multisite_minlevel"
FAQ

Frequently Asked Questions about Force User Login Multisite