Jurassic Login Security & Risk Analysis

wordpress.org/plugins/jurassic-login

Login error message inspired by the 1993 Steven Spielberg film Jurassic Park.

10 active installs v1.0 PHP + WP 3.6+ Updated Oct 24, 2018
adminjurassic-parklogin-error
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Jurassic Login Safe to Use in 2026?

Generally Safe

Score 85/100

Jurassic Login has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The 'jurassic-login' v1.0 plugin exhibits a remarkably clean static analysis report. There are no identified entry points such as AJAX handlers, REST API routes, shortcodes, or cron events, which significantly reduces the potential attack surface. Furthermore, the code shows excellent security practices, with no dangerous functions, all SQL queries using prepared statements, and all output properly escaped. File operations and external HTTP requests are also absent.

However, the lack of any capability or nonce checks across all identified code signals is a significant concern. While the current entry points are zero, this indicates a fundamental absence of security measures that would be crucial if new entry points were ever introduced or if any hidden vulnerabilities allowed for unexpected code execution paths. The taint analysis also shows no issues, which aligns with the absence of complex data flows or potentially vulnerable code patterns.

The vulnerability history is also completely clear, with no recorded CVEs. This, combined with the strong static analysis findings (apart from the missing checks), suggests a well-developed and secure plugin. The primary weakness lies in the foundational security checks that are not implemented, leaving a theoretical gap should the plugin's footprint expand or be leveraged in an unforeseen manner. Overall, the plugin appears very secure in its current state due to its limited functionality and careful coding, but the missing security mechanisms are a notable concern.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
Vulnerabilities
None known

Jurassic Login Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Jurassic Login Release Timeline

v1.0Current
Code Analysis
Analyzed Apr 16, 2026

Jurassic Login Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Jurassic Login Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterlogin_messagejurassic-login.php:32
actionwp_login_failedjurassic-login.php:35
Maintenance & Trust

Jurassic Login Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedOct 24, 2018
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Jurassic Login Developer Profile

ScreenRes

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Jurassic Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/jurassic-login/imgs/jurassic-magic-word.gif/wp-content/plugins/jurassic-login/imgs/jurassic-finger-wag.gif

HTML / DOM Fingerprints

CSS Classes
jurassic-login-wrap
HTML Comments
Jurassic Login--Only called when a login attempt fails
Data Attributes
id="jurassic-login-wrap"
FAQ

Frequently Asked Questions about Jurassic Login