GetOTP OTP Verification Security & Risk Analysis

wordpress.org/plugins/getotp-otp-verification

Implement Email OTP and SMS OTP for WordPress and WooCommerce. Support Login with 2FA.

10 active installs v1.4.1 PHP + WP 5.0+ Updated Aug 1, 2022
2faotptwo-factortwo-factor-authenticationtwo-step-verification
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GetOTP OTP Verification Safe to Use in 2026?

Generally Safe

Score 85/100

GetOTP OTP Verification has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The 'getotp-otp-verification' plugin v1.4.1 exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding SQL query handling, with 100% using prepared statements and a high percentage of properly escaped output. The absence of dangerous functions and file operations is also a strong indicator of secure coding. Furthermore, its vulnerability history is clean, with no known CVEs, suggesting a generally well-maintained codebase.

However, significant concerns arise from the static analysis. The plugin exposes three AJAX handlers, all of which lack authentication checks. This creates a substantial attack surface that could be exploited by unauthenticated users. The taint analysis revealed one flow with an unsanitized path of high severity, which could potentially lead to arbitrary code execution or file manipulation if not handled correctly. While the plugin does implement nonce and capability checks, their application seems insufficient given the unprotected AJAX endpoints.

In conclusion, while the plugin avoids common pitfalls like raw SQL and outdated libraries, the unprotected AJAX endpoints and the identified high-severity unsanitized path are critical weaknesses. The lack of a vulnerability history is positive, but it doesn't negate the immediate risks identified in the code. Immediate attention should be paid to securing the AJAX handlers and sanitizing the identified unsanitized path.

Key Concerns

  • Unprotected AJAX handlers present
  • High severity unsanitized path found
  • Attack surface without auth checks
Vulnerabilities
None known

GetOTP OTP Verification Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

GetOTP OTP Verification Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
6
41 escaped
Nonce Checks
2
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

87% escaped47 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
wp_otp_login_form (public\class-getotp-public.php:283)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
3 unprotected

GetOTP OTP Verification Attack Surface

Entry Points3
Unprotected3

AJAX Handlers 3

authwp_ajax_my_dismiss_getotp_noticeincludes\class-getotp.php:174
authwp_ajax_getotp_ajax_login_with_otpincludes\class-getotp.php:217
noprivwp_ajax_getotp_ajax_login_with_otpincludes\class-getotp.php:218
WordPress Hooks 18
actionplugins_loadedincludes\class-getotp.php:143
actionadmin_enqueue_scriptsincludes\class-getotp.php:157
actionadmin_enqueue_scriptsincludes\class-getotp.php:158
actionadmin_menuincludes\class-getotp.php:162
actionadmin_initincludes\class-getotp.php:163
actionadmin_noticesincludes\class-getotp.php:172
actionshow_user_profileincludes\class-getotp.php:178
actionedit_user_profileincludes\class-getotp.php:179
actionpersonal_options_updateincludes\class-getotp.php:181
actionedit_user_profile_updateincludes\class-getotp.php:182
actionwp_enqueue_scriptsincludes\class-getotp.php:196
actionwp_enqueue_scriptsincludes\class-getotp.php:197
actionlogin_enqueue_scriptsincludes\class-getotp.php:201
actionlogin_formincludes\class-getotp.php:203
filterlogin_messageincludes\class-getotp.php:204
filterauthenticateincludes\class-getotp.php:207
actionwp_loadedincludes\class-getotp.php:209
actionwoocommerce_login_formincludes\class-getotp.php:213
Maintenance & Trust

GetOTP OTP Verification Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedAug 1, 2022
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

GetOTP OTP Verification Developer Profile

LaLoka Labs

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GetOTP OTP Verification

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/getotp-otp-verification/admin/css/getotp-admin.css/wp-content/plugins/getotp-otp-verification/admin/js/getotp-admin.js
Script Paths
/wp-content/plugins/getotp-otp-verification/admin/js/getotp-admin.js
Version Parameters
getotp-otp-verification/admin/css/getotp-admin.css?ver=getotp-otp-verification/admin/js/getotp-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
getotp-notice
Data Attributes
name="mobile_phone"id="mobile_phone"
FAQ

Frequently Asked Questions about GetOTP OTP Verification