GuardianKey Security & Risk Analysis

wordpress.org/plugins/guardiankey

GuardianKey is a service to protect systems in real-time against authentication attacks. It implements GK Auth Security for login protection and GKTin …

20 active installs v5.7 PHP 5.5+ WP 4.4+ Updated Feb 6, 2026
authenticationblock-hackerslogin-securitysecurity
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GuardianKey Safe to Use in 2026?

Generally Safe

Score 100/100

GuardianKey has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The Guardian Key plugin v5.7 exhibits a mixed security posture. While it shows strong practices in avoiding dangerous functions and a clean vulnerability history with no recorded CVEs, several areas raise concerns. The presence of a REST API route without a permission callback represents a significant direct attack vector that could be exploited by unauthenticated users, leading to potential unauthorized actions or information disclosure. Furthermore, the taint analysis reveals flows with unsanitized paths, indicating a risk of handling user-supplied data in a way that could lead to vulnerabilities if not properly validated and sanitized before use. The absence of nonce checks, while not directly flagged as a vulnerability in this static analysis, is a common security control that is notably missing, potentially leaving certain operations open to replay attacks if they are critical and lack other authentication mechanisms.

Overall, the plugin's clean vulnerability history is a positive indicator, suggesting a generally careful development approach. However, the identified unprotected REST API endpoint and the unsanitized taint flows are critical findings that require immediate attention. The plugin's strengths lie in its limited attack surface beyond the REST API and its responsible use of SQL prepared statements and output escaping. Despite these strengths, the identified weaknesses, particularly the unprotected REST API, necessitate a cautious approach to its deployment until these issues are addressed.

Key Concerns

  • REST API route without permission callback
  • Taint flows with unsanitized paths
  • Missing nonce checks
Vulnerabilities
None known

GuardianKey Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

GuardianKey Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
4 prepared
Unescaped Output
9
34 escaped
Nonce Checks
0
Capability Checks
2
File Operations
16
External Requests
8
Bundled Libraries
0

SQL Query Safety

50% prepared8 total queries

Output Escaping

79% escaped43 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
validate_challenge (gktinc-sdk.class.php:135)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

GuardianKey Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

GET/wp-json/guardiankey/v1/author/(?P<id>\d+)index.php:56
WordPress Hooks 27
actionelementor_pro/forms/validationfunctions.php:561
actionwoocommerce_checkout_processfunctions.php:564
filterwpcf7_validatefunctions.php:567
actioninitindex.php:21
actionlogin_enqueue_scriptsindex.php:25
actionwp_enqueue_scriptsindex.php:26
actionadmin_enqueue_scriptsindex.php:27
actionlogin_formindex.php:29
actionwp_headindex.php:30
actionadmin_headindex.php:31
actiontemplate_redirectindex.php:33
actionadmin_initindex.php:35
actionwp_login_failedindex.php:37
actionadmin_initindex.php:40
filterwp_authenticate_userindex.php:42
actionadmin_menuindex.php:44
actiongk_unlockindex.php:45
actionupgrader_process_completeindex.php:46
actionplugins_loadedindex.php:48
filterwp_mail_content_typeindex.php:51
actionadmin_post_guardiankey_test_mailindex.php:52
actionadmin_post_sendqrcodeindex.php:53
actionrest_api_initindex.php:55
actioninitindex.php:63
actionwp_logoutindex.php:65
actionclear_blocked_ips_eventindex.php:67
actionlogin_messageindex.php:73

Scheduled Events 2

gk_unlock
clear_blocked_ips_event
Maintenance & Trust

GuardianKey Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.0
Last updatedFeb 6, 2026
PHP min version5.5
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

GuardianKey Developer Profile

gbernardes

1 plugin · 20 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GuardianKey

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/guardiankey/assets/css/gk_login.css/wp-content/plugins/guardiankey/assets/js/gk_login.js/wp-content/plugins/guardiankey/assets/css/gk_admin.css/wp-content/plugins/guardiankey/assets/js/gk_admin.js
Script Paths
/wp-content/plugins/guardiankey/assets/js/gk_login.js/wp-content/plugins/guardiankey/assets/js/gk_admin.js

HTML / DOM Fingerprints

CSS Classes
gk-login-formgk-admin-form
Data Attributes
data-gk-agentiddata-gk-keydata-gk-ivdata-gk-orgiddata-gk-authgroupiddata-gk-service
JS Globals
window.gk_login_obj
REST Endpoints
/wp-json/guardiankey/v1/author/
FAQ

Frequently Asked Questions about GuardianKey