[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fDhjkemdb4XMkRLM2Sh7v7tQyWOfzW3JTLWzg7K0WZug":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30,"vulnerabilities":31,"developer":32,"crawl_stats":29,"alternatives":39,"analysis":142,"fingerprints":232},"http-digest-auth","HTTP Digest Authentication","1.2.1","Jesin A","https:\u002F\u002Fprofiles.wordpress.org\u002Fjesin\u002F","\u003Cp>This plugin adds an additional layer of protection for the \u003Cstrong>wp-login.php\u003C\u002Fstrong> page using \u003Ca href=\"http:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FDigest_access_authentication\" rel=\"nofollow ugc\">HTTP Digest Authentication\u003C\u002Fa> with the PHP \u003Ca href=\"http:\u002F\u002Fphp.net\u002Fheader\" rel=\"nofollow ugc\">header()\u003C\u002Fa> function.\u003Cbr \u002F>\nSo it doesn’t require configuring web server files like \u003Cem>.htaccess\u003C\u002Fem> or \u003Ca href=\"https:\u002F\u002Fwebsistent.com\u002Ftools\u002Fhtdigest-generator-tool\u002F\" rel=\"nofollow ugc\">\u003Cem>.htdigest\u003C\u002Fem>\u003C\u002Fa> and works on all web hosting environments.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Important:\u003C\u002Fstrong> If you already have a plugin which does HTTP Authentication please deactivate it before activating this plugin. Similarly if you have configured your web server to do HTTP authentication on the wp-login.php file please remove it before using this plugin.\u003C\u002Fp>\n\u003Cp>If you are using FastCGI PHP this plugin may keep prompting for the credentials even if you enter the right pair, in this case use the following in your \u003Cstrong>\u003Ccode>.htaccess\u003C\u002Fcode>\u003C\u002Fstrong> file\u003C\u002Fp>\n\u003Cpre>\u003Ccode>\u003CIfModule mod_setenvif.c>\nSetEnvIfNoCase ^Authorization$ \"(.+)\" PHP_AUTH_DIGEST=$1\n\u003C\u002FIfModule>\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Ch4>Advantages of HTTP Digest Authentication\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Digest Authentication is very much safer than HTTP Basic Authentication whose credentials can be easily decoded with a \u003Ca href=\"http:\u002F\u002Fwww.base64decode.org\u002F\" rel=\"nofollow ugc\">base64 decoder\u003C\u002Fa>.\u003C\u002Fli>\n\u003Cli>From Wikipedia on \u003Ca href=\"http:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FBasic_access_authentication\" rel=\"nofollow ugc\">HTTP Basic Authentication\u003C\u002Fa>:\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cblockquote>\n\u003Cp>\u003Cem>The BA (Basic Authentication) mechanism provides no confidentiality protection for the transmitted credentials. They are merely encoded with BASE64 in transit, but not encrypted or hashed in any way.\u003C\u002Fem>\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Cul>\n\u003Cli>Digest Authentication on the other hand uses \u003Ca href=\"https:\u002F\u002Fwebsistent.com\u002Ftools\u002Fmd5-encryption-tool\u002F\" rel=\"nofollow ugc\">MD5\u003C\u002Fa> on the credentials making it “one way” \u003C\u002Fli>\n\u003Cli>Uses server and client \u003Ca href=\"http:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FCryptographic_nonce\" rel=\"nofollow ugc\">nonce\u003C\u002Fa>s to prevent replay attacks\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Features of the HTTP Digest Auth plugin\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Works using PHP header() function and doesn’t require modification of service config files (like .htaccess, nginx.conf etc)\u003C\u002Fli>\n\u003Cli>Supports HTTP credentials for each WordPress user\u003C\u002Fli>\n\u003Cli>Clears the HTTP Digest credentials when the user logs out of WordPress (more on this in the FAQ)\u003C\u002Fli>\n\u003Cli>Verifies if both the HTTP and WordPress credentials are of the same user (this is the default behavior and can be changed)\u003C\u002Fli>\n\u003Cli>Works on all major Web Servers (Tested on Apache, Nginx and Lighttpd)\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Plugin Behavior\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>When this plugin is activated for the first time all WordPress users will have the following Digest credentials\u003Cbr \u002F>\nUsername: \u003CWordPress username>\u003Cbr \u002F>\nPassword: password\u003Cbr \u002F>\nThis can be changed from \u003Cstrong>Users > Your Profile\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>After activating this plugin for the first time you’ll be prompted for HTTP credentials when you logout\u003C\u002Fli>\n\u003Cli>Similarly if you change your HTTP username or password you’ll be prompted for this when you logout\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Available languages\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>English\u003C\u002Fli>\n\u003Cli>Serbo-Croatian by \u003Ca href=\"http:\u002F\u002Fwww.webhostinghub.com\u002F\" rel=\"nofollow ugc\">Borisa Djuraskovic\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>The \u003Ca href=\"https:\u002F\u002Fwebsistent.com\u002Fwordpress-plugins\u002Fhttp-digest-authentication\u002F\" rel=\"nofollow ugc\">HTTP Digest Authentication Plugin\u003C\u002Fa> official homepage.\u003C\u002Fp>\n","Protect your wp-login.php page with HTTP Digest Authentication without the need of adding web server modules or changing config files.",10,4957,80,5,"2017-11-25T14:25:00.000Z","4.9.29","3.1.0","",[20,21,22,23,24],"auth","authenticate","hacking","http-digest","login","https:\u002F\u002Fwebsistent.com\u002Fwordpress-plugins\u002Fhttp-digest-authentication\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhttp-digest-auth.1.2.1.zip",85,0,null,"2026-03-15T15:16:48.613Z",[],{"slug":33,"display_name":7,"profile_url":8,"plugin_count":34,"total_installs":35,"avg_security_score":27,"avg_patch_time_days":36,"trust_score":37,"computed_at":38},"jesin",3,670,30,84,"2026-04-04T09:04:10.146Z",[40,57,77,103,122],{"slug":41,"name":42,"version":43,"author":44,"author_profile":45,"description":46,"short_description":47,"active_installs":11,"downloaded":48,"rating":49,"num_ratings":50,"last_updated":51,"tested_up_to":52,"requires_at_least":17,"requires_php":18,"tags":53,"homepage":55,"download_link":56,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"two-factor-auth","Two Factor Auth","4.4","oskarhane","https:\u002F\u002Fprofiles.wordpress.org\u002Foskarhane\u002F","\u003Cp>Secure WordPress login with this two factor auth. Users will have to enter an One Time Password when they log in.\u003C\u002Fp>\n\u003Ch4>Why You Need This\u003C\u002Fh4>\n\u003Cp>Users can have common or weak passwords that lets hackers\u002Fbots brute-force your WordPress site and gain access to your files and place malware there.\u003Cbr \u002F>\nJust like happend not that long ago: \u003Ca href=\"http:\u002F\u002Ftechcrunch.com\u002F2013\u002F04\u002F12\u002Fhackers-point-large-botnet-at-wordpress-sites-to-steal-admin-passwords-and-gain-server-access\u002F\" rel=\"nofollow ugc\">Article on TechCrunch\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>If all sites would have used this plugin, this would never happend.\u003Cbr \u002F>\nIt doesn’t matter how weak your users passwords are, no one can gain access to your WordPress site\u003Cbr \u002F>\nwithout already having access to the users mobile phone or email inbox (depending on how the user gets his OTP).\u003C\u002Fp>\n\u003Ch4>How Does It Work?\u003C\u002Fh4>\n\u003Cp>This plugin uses the industry standard algorithm \u003Ca href=\"http:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FTime-based_One-time_Password_Algorithm\" rel=\"nofollow ugc\">TOTP\u003C\u002Fa> or \u003Ca href=\"http:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FHMAC-based_One-time_Password_Algorithm\" rel=\"nofollow ugc\">HOTP\u003C\u002Fa> for creating One Time Passwords.\u003Cbr \u002F>\nA OTP is valid for a certain time and after that a new code has to be entered.\u003C\u002Fp>\n\u003Cp>You can now choose to use third party apps like \u003Ca href=\"http:\u002F\u002Fcode.google.com\u002Fp\u002Fgoogle-authenticator\u002F\" rel=\"nofollow ugc\">Google Authenticator\u003C\u002Fa> which is available for most mobile platforms. You can really use any\u003Cbr \u002F>\nthird party app that supports TOTP\u002FHOTP that generates 6 digits OTP’s.\u003Cbr \u002F>\nOr, as before, you can choose to get your One Time Passwords by email.\u003C\u002Fp>\n\u003Cp>Since you have to enter a secret code to third party apps, email is the default way of delivering One Time Passwords. Your\u003Cbr \u002F>\nusers will have to activate delivery by third party apps themselves.\u003C\u002Fp>\n\u003Ch4>Easy To Use\u003C\u002Fh4>\n\u003Cp>Just install this plugin and you’re all set. There’s really nothing more to it.\u003Cbr \u002F>\nIf you want to use a third party app, goto Two Factor Auth in the admin menu and activate it and set up your app.\u003Cbr \u002F>\nGeneral settings can be found uner Settings -> Two Factor Auth in admin menu. Settings for each individual user\u003Cbr \u002F>\ncan be found at the root level of the admin menu, in Two Factor Auth.\u003Cbr \u002F>\nA bit more work to get logged in, but a whole lot more secure!\u003C\u002Fp>\n\u003Cp>If you use WooCommerce or other plugins that make custom login forms, you will not be able to login through those anymore.\u003Cbr \u002F>\nI will be adding a plugin that puts a One Time Password field to WooCommerce. If you use some other plugin that needs\u003Cbr \u002F>\nsupport for this, let me know in the support forum.\u003C\u002Fp>\n\u003Ch4>TOTP or HOTP\u003C\u002Fh4>\n\u003Cp>Which algorithm you and your users choose doesn’t really matter. The time based TOTP is a bit more secure since a One Time\u003Cbr \u002F>\nPassword is valid only for a certain amount of time. But this requires the server time to be in sync the clients time (if\u003Cbr \u002F>\nthe OTP isn’t delivered by email). This is often hard to do with embedded clients and the event based HOTP is then a better choice.\u003Cbr \u002F>\nIf you have a somewhat slow email server and have chosen email delivery, you might not get the TOTP in time.\u003C\u002Fp>\n\u003Cp>Conslusion: Choose which ever you want. TOTP is a little bit safer since OTP:s only are valid for a short period.\u003C\u002Fp>\n\u003Cp>Note that email delivery users always uses the site default algorithm, which you can set on the settings page. Third party\u003Cbr \u002F>\napps users can choose which one they want.\u003C\u002Fp>\n\u003Ch4>Is this really Two Factor Auth?\u003C\u002Fh4>\n\u003Cp>Before version 3.0 this plugin had ‘kind of’ two factor auth where the OTP was delivered to an email address.\u003Cbr \u002F>\nSince version 3.0 you can have real two factor auth if you activate the Third Party Apps delivery type.\u003C\u002Fp>\n\u003Cp>Read more about \u003Ca href=\"http:\u002F\u002Foskarhane.com\u002Ftwo-factor-auth-explained\u002F\" rel=\"nofollow ugc\">what two factor auth means >>\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>See http:\u002F\u002Foskarhane.com\u002Fplugin-two-factor-auth-for-wordpress\u002F for more info.\u003C\u002Fp>\n","Secure WordPress login with Two Factor Auth. Users will have to enter an One Time Password when they log in.",14401,92,22,"2014-07-29T12:54:00.000Z","3.9.40",[20,21,24,54,41],"security","http:\u002F\u002Foskarhane.com\u002Fplugin-two-factor-auth-for-wordpress","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftwo-factor-auth.4.4.zip",{"slug":58,"name":59,"version":60,"author":61,"author_profile":62,"description":63,"short_description":64,"active_installs":11,"downloaded":65,"rating":66,"num_ratings":67,"last_updated":68,"tested_up_to":69,"requires_at_least":70,"requires_php":18,"tags":71,"homepage":75,"download_link":76,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"wp-secure-login","WP Secure Login","1.1","brijeshk89","https:\u002F\u002Fprofiles.wordpress.org\u002Fbrijeshk89\u002F","\u003Cp>WP Secure Login adds a security layer and 2 step authentication to your WordPress site by asking a One Time Password in addition to the username and password on the login page. The One Time Password is displayed on your smartphone using Google Authenticator app (available in market place for FREE). The One Time Password is re-generated at regular intervals which can be customized from admin panel. As soon as the new OTP is generated the old ones are marked as invalid.\u003C\u002Fp>\n\u003Cp>One Time Password needs to be configured once by every user from Edit Profile page.\u003C\u002Fp>\n\u003Cp>Features in WP Secure Login 1.1 include:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>2 Step Authentication\u003C\u002Fli>\n\u003Cli>Unique Secret key for each user\u003C\u002Fli>\n\u003Cli>Configure\u002FRe-Configure WP Secure Login\u003C\u002Fli>\n\u003Cli>Unique One Time Passwords generated by Google Authenticator App\u003C\u002Fli>\n\u003Cli>Supported on iOS\u002FAndroid\u002FBlackberry smartphones\u003C\u002Fli>\n\u003Cli>Completely FREE\u003C\u002Fli>\n\u003Cli>Licensed under GNU GPL version 3\u003C\u002Fli>\n\u003Cli>Safe & Secure\u003C\u002Fli>\n\u003C\u002Ful>\n","WP Secure Login adds a security layer and 2 step authentication to your WordPress site by asking a One Time Password in addition to the username and p &hellip;",2693,100,1,"2014-09-17T18:12:00.000Z","4.0.38","3.0",[72,21,73,24,74],"2-step","authentication","secure","http:\u002F\u002Fwordpress.org\u002Fextend\u002Fplugins\u002Fwp-secure-login\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-secure-login.1.1.zip",{"slug":78,"name":79,"version":80,"author":81,"author_profile":82,"description":83,"short_description":84,"active_installs":85,"downloaded":86,"rating":87,"num_ratings":88,"last_updated":89,"tested_up_to":90,"requires_at_least":91,"requires_php":92,"tags":93,"homepage":98,"download_link":99,"security_score":100,"vuln_count":101,"unpatched_count":28,"last_vuln_date":102,"fetched_at":30},"all-in-one-wp-security-and-firewall","All-In-One Security (AIOS) – Security and Firewall","5.4.6","David Anderson \u002F Team Updraft","https:\u002F\u002Fprofiles.wordpress.org\u002Fdavidanderson\u002F","\u003Ch3>THE TOP RATED WORDPRESS SECURITY AND FIREWALL PLUGIN\u003C\u002Fh3>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security?utm_source=aios-wp-dir&utm_medium=referral&utm_campaign=plugin-dir&utm_content=aios&utm_creative_format=description\" rel=\"nofollow ugc\">All-in-One Security (AIOS)\u003C\u002Fa> is a WordPress security plugin from the same, trusted team that brought you UpdraftPlus.\u003C\u002Fp>\n\u003Cp>It’s called ‘All-In-One’ because it’s packed full of ways to keep your WordPress website(s) safe and secure.\u003C\u002Fp>\n\u003Cp>It includes:\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Login security features\u003C\u002Fstrong> keep bots at bay. Lock out users based on a configurable number of login attempts, get two-factor authentication and more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>File and database security.\u003C\u002Fstrong> Get notified of file changes that occur outside of normal operations. Block access to key files and scan files and folders to spot insecure permissions.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Firewall.\u003C\u002Fstrong> Get PHP, .htaccess and 6G firewall rules courtesy of Perishable Press. Spot and block fake Google Bots and more!\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Spam prevention.\u003C\u002Fstrong> Prevent annoying spam comments and reduce unnecessary load on the server. Automatically and permanently block IP addresses that exceed a set number of spam comments.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Audit log.\u003C\u002Fstrong> View events happening on your WordPress website. Find out if a plugin or theme has been added, removed, updated and more.\u003C\u002Fp>\n\u003Ch4>WHY ALL-IN-ONE SECURITY?\u003C\u002Fh4>\n\u003Cp>AIOS has a near-perfect \u003Cstrong>4.7 \u002F 5-star user rating\u003C\u002Fstrong> across more than 1 million installs.\u003C\u002Fp>\n\u003Cp>Great for beginners and experts alike. AIOS guides you logically and clearly through each of its features which are all clearly explained. Security features are marked as basic, intermediate and advanced. Each step increases your security score. Turn them on and watch your protection grow!\u003C\u002Fp>\n\u003Cp>We have a large support team of software developers. That means we have the availability and the skillset to help you with the trickiest of queries.\u003C\u002Fp>\n\u003Cp>We comb the WordPress plugin directory for support tickets daily – most queries are responded to within 24 hours.\u003C\u002Fp>\n\u003Cp>\u003Cem>Excellent plugin with numerous well-thought-out options for making a website more secure. I have been using it for years and am very happy with it. I recently had a small problem setting up a website and – even as a non-premium user – I received support very quickly. Highly recommended!\u003C\u002Fem>\u003C\u002Fp>\n\u003Cp>For even more ways to stay safe and secure, upgrade to \u003Ca href=\"https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u002Fpricing?utm_source=aios-wp-dir&utm_medium=referral&utm_campaign=plugin-dir&utm_content=aios_premium&utm_creative_format=description\" rel=\"nofollow ugc\">AIOS Premium\u003C\u002Fa> – it packs a punch security-wise, whilst being \u003Cstrong>extremely cost-competitive\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Ch4>LOGIN SECURITY\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Two-factor authentication (TFA)\u003C\u002Fstrong> – Require TFA for specific user roles. Supports Google Authenticator, Microsoft Authenticator, Authy, and many more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Detect and manage ‘admin’ usernames\u003C\u002Fstrong> – Identify default ‘admin’ usernames and guide users to change them to protect against brute force attacks.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Identify and correct identical login and display names\u003C\u002Fstrong> – Detect cases where the display name matches the username and provide guidance to improve login security.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Prevent user enumeration\u003C\u002Fstrong> – Block unauthorised access to URLs that can reveal sensitive information such as usernames or other details.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Control login attempts\u003C\u002Fstrong> – Prevent brute force attacks by limiting the number of failed login attempts. Choose how many login attempts are allowed, set lockout durations, and more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Force user logout\u003C\u002Fstrong> – Automatically log out users after a specified period of time. Unattended sessions are closed, reducing the risk of unauthorised access.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Manually approve new registrations\u003C\u002Fstrong> – Review and approve new user registrations to prevent spam and fake sign-ups.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Enhance WordPress salt security\u003C\u002Fstrong> – Adds 64 extra characters to WordPress salts, rotating them weekly. Makes cracking passwords virtually impossible, even if your database is stolen.\u003C\u002Fp>\n\u003Ch4>Plugin Support\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>If you have a question or problem with the All-In-One Security plugin, post it on the support forum and we will help you. Premium customers can log queries directly with the team via https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u002F\u003Cbr \u002F>\n\u003Cstrong>Monitor and manage active sessions\u003C\u002Fstrong> – If a user is logged in who shouldn’t be, log them out or add them to a blacklist.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>SPAM PREVENTION\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block spam coming from bots\u003C\u002Fstrong> – Reduce the load on your server and improve the user experience by automatically blocking spam comments from bots.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Monitor spam IP addresses\u003C\u002Fstrong> – Monitor the IP addresses of people or bots leaving spam comments. Choose which ones to block based on a configurable number of comments left.\u003C\u002Fp>\n\u003Ch4>FILE \u002F DATABASE Security\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Scan and fix file permissions\u003C\u002Fstrong> – Scan for insecure file permissions. Click once to fix issues and safeguard critical files and folders.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Disable PHP file editing\u003C\u002Fstrong> – Disable editing of PHP files (such as plugins and themes) via the dashboard. It’s often the first tool that attackers use as it allows for code execution.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Protect sensitive files\u003C\u002Fstrong> – Prevent access to files like readme.html that might reveal information about your WordPress installation.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>File change scanner\u003C\u002Fstrong> – Get notified of any file changes which occur on your system. Exclude files and folders which change as part of normal operations.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Prevent image hotlinking\u003C\u002Fstrong> – Prevent other websites from displaying your images via hotlinking and protect server bandwidth.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Secure database backups\u003C\u002Fstrong> – Perform a database backup via UpdraftPlus from AIOS. Change the default ‘wp_’ prefix to hide your WordPress database from hackers.\u003C\u002Fp>\n\u003Ch4>FIREWALL\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Get .htaccess firewall rules\u003C\u002Fstrong> – Deny access to the .htaccess and wp-config.php files. Disable the server signature and limit file uploads to a configurable size.**\u003C\u002Fp>\n\u003Cp>Block access to the debug.log file and prevent Apache servers from listing the contents of a directory when an index.php file is not present\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Get PHP firewall rules\u003C\u002Fstrong> – PHP firewall rules prevent malicious users from exploiting well-known vulnerabilities in XML-RPC. Safeguard your content by disabling RSS and Atom feeds and avoid cross-site scripting (XSS) attacks.\u003Cbr \u002F>\nBlock fake Google bots and POST requests made by bots – Block fake Google bots and stop bots from making POST requests by blocking IP addresses where the user-agent and referrer fields are blank.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Utilise 6G firewall rules\u003C\u002Fstrong> – Employ flexible blacklist rules to reduce the number of malicious URL requests that hit your website (courtesy of Perishable Press).\u003C\u002Fp>\n\u003Cp>\u003Cstrong>And more\u003C\u002Fstrong> – Blacklist (and whitelist) IP ranges and user agents and block unauthorized access to data by disabling REST API access for non-logged-in requests.\u003C\u002Fp>\n\u003Ch4>TWO-FACTOR AUTHENTICATION ENHANCED [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Two-factor authentication\u003C\u002Fstrong> is included in the free plugin. Upgrade to Premium if you’d like to:\u003Cbr \u002F>\nRequire TFA after a set time period – Mandate TFA for all admins or other roles after their accounts reach a specified age.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Control how often TFA is required\u003C\u002Fstrong> – Set TFA to be required after a certain number of days on trusted devices instead of every login.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Customise design layout\u003C\u002Fstrong> – Adjust the TFA design to match your website’s existing layout and branding.\u003Cbr \u002F>\nEmergency codes – Generate one-time use emergency codes to regain access if you lose your TFA device.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>WordPress Multisite Compatible\u003C\u002Fstrong> – Ensure compatibility with WordPress multisite networks and their sub-sites for consistent TFA application.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Integration with login forms\u003C\u002Fstrong> – Integrate TFA with various login forms, including WooCommerce, Affiliates-WP, Elementor Pro, bbPress, and ‘Theme My Login’ without additional coding.\u003C\u002Fp>\n\u003Ch4>SMART 404 BLOCKING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block IPs based on 404 errors\u003C\u002Fstrong> – Detect hackers probing your URLs via script and bots by the 404 errors they leave behind.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 Configuration\u003C\u002Fstrong> – Set a figure for the maximum number of 404 events allowed before an IP address is blocked. Choose a time period within which the 404 events must occur (e.g., 10 errors within 10 minutes).\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 block by URL string\u003C\u002Fstrong> – Instantly block an IP address if a 404 event includes a specific URL string.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 whitelisting\u003C\u002Fstrong> – Prevent particular IP addresses from being permanently blocked due to 404 events.\u003C\u002Fp>\n\u003Ch4>COUNTRY BLOCKING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block traffic to the entire site or to specific pages or posts\u003C\u002Fstrong> – Useful if you’re an e-commerce site and you want to block sales to some countries for shipping or tax reasons.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Whitelist some users from blocked countries\u003C\u002Fstrong> – Whitelist IP addresses or IP ranges even if they are part of a blocked country.\u003C\u002Fp>\n\u003Ch4>MALWARE SCANNING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Automatic malware scanning\u003C\u002Fstrong> – Detect and protect against the latest malware, trojans, and spyware.\u003Cbr \u002F>\nAlerts you to blacklisting by search engines – Monitor your site for blacklisting by search engines due to malicious code.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Response time monitoring\u003C\u002Fstrong> – Keep track of your website’s response time to identify and address any performance issues.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Uptime monitoring\u003C\u002Fstrong> – Checks your website’s uptime every 5 minutes and alerts you immediately if your site or server goes down.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Advice and malware removal\u003C\u002Fstrong> – Need hands-on advice and support for malware removal? Our team of genuine cybersecurity experts is here to help.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Notification if something’s amiss\u003C\u002Fstrong> – Receive notifications about any issues with your site so you can address problems before they escalate.\u003C\u002Fp>\n\u003Ch4>Plugin Support\u003C\u002Fh4>\n\u003Cp>If you have a question or problem with the All-In-One Security plugin, post it on the support forum and we will help you. Premium customers can log queries directly with the team via https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u003C\u002Fp>\n\u003Ch4>Developers\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>If you are a developer and you need some extra hooks or filters for this plugin then let us know.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Translations\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>All-In-One Security plugin can be translated to any language.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Currently available translations:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>English\u003C\u002Fli>\n\u003Cli>German\u003C\u002Fli>\n\u003Cli>Spanish\u003C\u002Fli>\n\u003Cli>French\u003C\u002Fli>\n\u003Cli>Hungarian\u003C\u002Fli>\n\u003Cli>Italian\u003C\u002Fli>\n\u003Cli>Swedish\u003C\u002Fli>\n\u003Cli>Russian\u003C\u002Fli>\n\u003Cli>Chinese\u003C\u002Fli>\n\u003Cli>Portuguese (Brazil)\u003C\u002Fli>\n\u003Cli>Persian\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Privacy Policy\u003C\u002Fh4>\n\u003Cp>This plugin may collect IP addresses for security reasons such as mitigating brute force login threats and malicious activity.\u003C\u002Fp>\n\u003Cp>The collected information is stored on your server. No information is transmitted to third parties or remote server locations.\u003C\u002Fp>\n\u003Ch4>Usage\u003C\u002Fh4>\n\u003Cp>Go to the settings menu after you activate the plugin and follow the instructions.\u003C\u002Fp>\n\u003Ch3>Usage\u003C\u002Fh3>\n\u003Cp>Go to the settings menu after you activate the plugin and follow the instructions.\u003C\u002Fp>\n","Protect your website investment with All-In-One Security (AIOS) – a comprehensive and easy to use security plugin designed especially for WordPress.",1000000,36139406,94,1693,"2026-01-28T22:15:00.000Z","6.9.4","5.0","5.6",[94,95,96,54,97],"firewall","login-security","malware-scanning","two-factor-authentication","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fall-in-one-wp-security-and-firewall\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fall-in-one-wp-security-and-firewall.5.4.6.zip",93,26,"2024-02-08 00:00:00",{"slug":104,"name":105,"version":106,"author":107,"author_profile":108,"description":109,"short_description":110,"active_installs":111,"downloaded":112,"rating":49,"num_ratings":113,"last_updated":114,"tested_up_to":115,"requires_at_least":116,"requires_php":18,"tags":117,"homepage":118,"download_link":119,"security_score":120,"vuln_count":34,"unpatched_count":28,"last_vuln_date":121,"fetched_at":30},"limit-login-attempts","Limit Login Attempts","1.7.2","Automattic","https:\u002F\u002Fprofiles.wordpress.org\u002Fautomattic\u002F","\u003Cp>Limit the number of login attempts possible both through normal login as well as using auth cookies.\u003C\u002Fp>\n\u003Cp>By default WordPress allows unlimited login attempts either through the login page or by sending special cookies. This allows passwords (or hashes) to be brute-force cracked with relative ease.\u003C\u002Fp>\n\u003Cp>Limit Login Attempts blocks an Internet address from making further attempts after a specified limit on retries is reached, making a brute-force attack difficult or impossible.\u003C\u002Fp>\n\u003Cp>Features\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Limit the number of retry attempts when logging in (for each IP). Fully customizable\u003C\u002Fli>\n\u003Cli>Limit the number of attempts to log in using auth cookies in same way\u003C\u002Fli>\n\u003Cli>Informs user about remaining retries or lockout time on login page\u003C\u002Fli>\n\u003Cli>Optional logging, optional email notification\u003C\u002Fli>\n\u003Cli>Handles server behind reverse proxy\u003C\u002Fli>\n\u003Cli>It is possible to whitelist IPs using a filter. But you probably shouldn’t. 🙂\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Translations: Bulgarian, Brazilian Portuguese, Catalan, Chinese (Traditional), Czech, Dutch, Finnish, French, German, Hungarian, Norwegian, Persian, Romanian, Russian, Spanish, Swedish, Turkish\u003C\u002Fp>\n\u003Cp>Plugin uses standard actions and filters only.\u003C\u002Fp>\n","Limit rate of login attempts, including by way of cookies, for each IP. Fully customizable.",300000,2279689,202,"2023-04-04T19:15:00.000Z","6.2.9","2.8",[73,24,54],"http:\u002F\u002Fdevel.kostdoktorn.se\u002Flimit-login-attempts","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flimit-login-attempts.1.7.2.zip",82,"2023-04-10 00:00:00",{"slug":123,"name":124,"version":125,"author":126,"author_profile":127,"description":128,"short_description":129,"active_installs":130,"downloaded":131,"rating":132,"num_ratings":133,"last_updated":134,"tested_up_to":135,"requires_at_least":136,"requires_php":18,"tags":137,"homepage":18,"download_link":139,"security_score":140,"vuln_count":34,"unpatched_count":28,"last_vuln_date":141,"fetched_at":30},"wps-limit-login","WPS Limit Login","1.5.9.2","NicolasKulka","https:\u002F\u002Fprofiles.wordpress.org\u002Fnicolaskulka\u002F","\u003Ch4>Français\u003C\u002Fh4>\n\u003Cp>Limitez le nombre de tentatives de connexion possibles via la page de connexion et en utilisant les cookies auth.\u003Cbr \u002F>\nWordPress par défaut permet des tentatives de connexion illimitées soit via la page de connexion ou en envoyant des cookies spéciaux. Cela permet aux mots de passe (ou hashs) d’être craqués via la force brute relativement facilement.\u003Cbr \u002F>\nWPS Limit login limite les tentatives de connexion et bloque l’envoi d’autres tentatives à une adresse Internet après l’atteinte d’une limite spécifiée, ce qui rend une attaque par force brute difficile, voire impossible.\u003C\u002Fp>\n\u003Cp>Caractéristiques:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Limiter le nombre de nouvelles tentatives lors de la connexion (pour chaque IP). Ceci est entièrement personnalisable.\u003C\u002Fli>\n\u003Cli>Limitez le nombre de tentatives de connexion en utilisant des cookies d’autorisation de la même manière.\u003C\u002Fli>\n\u003Cli>Informe l’utilisateur sur les tentatives restantes ou le temps de verrouillage sur la page de connexion.\u003C\u002Fli>\n\u003Cli>Journalisation et notification par courriel facultative.\u003C\u002Fli>\n\u003Cli>Gère le serveur derrière le proxy inverse (reverse proxy).\u003C\u002Fli>\n\u003Cli>Il est possible de mettre en liste blanche \u002F liste noire les adresses IP.\u003C\u002Fli>\n\u003Cli>Compatibilité avec le pare-feu du site Web Sucuri.\u003C\u002Fli>\n\u003Cli>Protection de passerelle \u003Cstrong>XMLRPC\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Woocommerce\u003C\u002Fstrong> protection de la page de connexion.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Compatibilité multi-sites\u003C\u002Fstrong> avec des paramètres MU supplémentaires.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Pour en savoir plus lisez l’article suivant : \u003Ca href=\"https:\u002F\u002Fwpformation.com\u002Fwps-limit-login\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fwpformation.com\u002Fwps-limit-login\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Ce plugin vous est gentiment proposé par \u003Ca href=\"https:\u002F\u002Fwww.wpserveur.net\u002F?refwps=14&campaign=wpslimitlogin\" rel=\"nofollow ugc\">WPServeur\u003C\u002Fa> l’hébergeur spécialisé WordPress.\u003C\u002Fp>\n\u003Cp>Découvrez également nos autres extensions gratuites :\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Ffr.wordpress.org\u002Fplugins\u002Fwps-hide-login\u002F\" rel=\"nofollow ugc\">WPS Hide Login\u003C\u002Fa> pour changer votre URL de connexion en ce que vous voulez.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Ffr.wordpress.org\u002Fplugins\u002Fwps-bidouille\u002F\" rel=\"nofollow ugc\">WPS Bidouille\u003C\u002Fa> pour optimiser votre WordPress et faire le plein d’infos.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Ffr.wordpress.org\u002Fplugins\u002Fwps-cleaner\u002F\" rel=\"nofollow ugc\">WPS Cleaner\u003C\u002Fa> pour nettoyer votre site WordPress.\u003C\u002Fp>\n\u003Cp>Ce plugin est seulement maintenu, ce qui signifie que nous ne garantissons pas un support gratuit. Envisagez de signaler un problème et soyez patient.\u003C\u002Fp>\n\u003Ch4>English\u003C\u002Fh4>\n\u003Cp>Limit the number of login attempts that possible both through the normal login as well as using the auth cookies.\u003Cbr \u002F>\nWordPress by default allows unlimited login attempts either through the login page or by sending special cookies. This allows passwords (or hashes) to be cracked via brute-force relatively easily.\u003Cbr \u002F>\nWPS Limit login blocks an Internet address from making further attempts after a specified limit on retries has been reached, making a brute-force attack difficult or impossible.\u003C\u002Fp>\n\u003Cp>Features:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Limit the number of retry attempts when logging in (per each IP). This is fully customizable.\u003C\u002Fli>\n\u003Cli>Limit the number of attempts to log in using authorization cookies in the same way.\u003C\u002Fli>\n\u003Cli>Informs the user about the remaining retries or lockout time on the login page.\u003C\u002Fli>\n\u003Cli>Optional logging and optional email notification.\u003C\u002Fli>\n\u003Cli>Handles server behind the reverse proxy.\u003C\u002Fli>\n\u003Cli>It is possible to whitelist\u002Fblacklist IPs.\u003C\u002Fli>\n\u003Cli>Sucuri Website Firewall compatibility.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>XMLRPC\u003C\u002Fstrong> gateway protection.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Woocommerce\u003C\u002Fstrong> login page protection.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Multi-site\u003C\u002Fstrong> compatibility with extra MU settings.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>To learn more read the following article: \u003Ca href=\"https:\u002F\u002Fwpformation.com\u002Fwps-limit-login\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fwpformation.com\u002Fwps-limit-login\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>This plugin is kindly proposed by \u003Ca href=\"https:\u002F\u002Fwww.wpserveur.net\u002F?refwps=14&campaign=wpslimitlogin\" rel=\"nofollow ugc\">WPServeur\u003C\u002Fa> the specialized WordPress web host.\u003C\u002Fp>\n\u003Cp>Découvrez également nos autres extensions gratuites :\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwps-hide-login\u002F\" rel=\"ugc\">WPS Hide Login\u003C\u002Fa> to change your login URL to whatever you want.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwps-bidouille\u002F\" rel=\"ugc\">WPS Bidouille\u003C\u002Fa> to optimize your WordPress and get more info.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwps-cleaner\u002F\" rel=\"ugc\">WPS Cleaner\u003C\u002Fa> to clean your WordPress site.\u003C\u002Fp>\n\u003Cp>This plugin is only maintained, which means we do not guarantee free support. Consider reporting a problem and be patient.\u003C\u002Fp>\n","WPS Limit login limit connection attempts by IP address",100000,931525,98,83,"2025-06-24T07:45:00.000Z","6.8.5","4.2",[73,138,24,54,123],"limit-login","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwps-limit-login.1.5.9.2.zip",96,"2019-07-23 00:00:00",{"attackSurface":143,"codeSignals":193,"taintFlows":224,"riskAssessment":225,"analyzedAt":231},{"hooks":144,"ajaxHandlers":189,"restRoutes":190,"shortcodes":191,"cronEvents":192,"entryPointCount":28,"unprotectedCount":28},[145,151,155,159,163,168,172,176,180,184],{"type":146,"name":147,"callback":148,"file":149,"line":150},"action","show_user_profile","user_profile","admin-options.php",17,{"type":146,"name":152,"callback":153,"file":149,"line":154},"personal_options_update","process_user_option_update",20,{"type":146,"name":156,"callback":157,"file":149,"line":158},"delete_user","remove_user_meta",23,{"type":146,"name":160,"callback":161,"priority":162,"file":149,"line":101},"admin_notices","admin_notice",9999,{"type":146,"name":164,"callback":165,"file":166,"line":167},"init","plugin_init","plugin.php",33,{"type":146,"name":169,"callback":170,"file":166,"line":171},"wp_authenticate","http_check",39,{"type":146,"name":173,"callback":174,"file":166,"line":175},"user_register","add_user_credentials",42,{"type":146,"name":177,"callback":178,"file":166,"line":179},"wp_logout","clear_realm",45,{"type":146,"name":181,"callback":182,"file":166,"line":183},"login_form","show_logged_in",48,{"type":185,"name":186,"callback":187,"file":166,"line":188},"filter","login_message","message_registration",51,[],[],[],[],{"dangerousFunctions":194,"sqlUsage":195,"outputEscaping":197,"fileOperations":28,"externalRequests":28,"nonceChecks":67,"capabilityChecks":28,"bundledLibraries":223},[],{"prepared":28,"raw":28,"locations":196},[],{"escaped":28,"rawEcho":198,"locations":199},15,[200,203,205,206,207,208,210,211,212,214,215,216,217,219,221],{"file":149,"line":201,"context":202},36,"raw output",{"file":149,"line":204,"context":202},40,{"file":149,"line":175,"context":202},{"file":149,"line":175,"context":202},{"file":149,"line":175,"context":202},{"file":149,"line":209,"context":202},47,{"file":149,"line":183,"context":202},{"file":149,"line":183,"context":202},{"file":149,"line":213,"context":202},54,{"file":149,"line":213,"context":202},{"file":149,"line":213,"context":202},{"file":149,"line":213,"context":202},{"file":149,"line":218,"context":202},55,{"file":149,"line":220,"context":202},132,{"file":166,"line":222,"context":202},284,[],[],{"summary":226,"deductions":227},"The http-digest-auth plugin version 1.2.1 exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The plugin has a remarkably small attack surface, with zero identified entry points like AJAX handlers, REST API routes, shortcodes, or cron events.  Furthermore, all observed SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are common vectors for vulnerabilities. The presence of a nonce check is also a positive indicator of security consciousness.\n\nHowever, a significant concern arises from the output escaping analysis, where 100% of the 15 identified outputs are not properly escaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities if user-controlled data is displayed directly without sanitization.  Despite the absence of critical or high-severity taint flows and a clean vulnerability history, this lack of output escaping presents a notable risk. The plugin's limited functionality and thus minimal complexity likely contribute to its clean vulnerability history, but the unescaped output remains a critical area for improvement to achieve a robust security profile.",[228],{"reason":229,"points":230},"100% of outputs not properly escaped",8,"2026-03-17T00:03:45.092Z",{"wat":233,"direct":238},{"assetPaths":234,"generatorPatterns":235,"scriptPaths":236,"versionParams":237},[],[],[],[],{"cssClasses":239,"htmlComments":240,"htmlAttributes":241,"restEndpoints":242,"jsGlobals":243,"shortcodeOutput":244},[],[],[],[],[],[]]