
Limit Login Attempts Security & Risk Analysis
wordpress.org/plugins/limit-login-attemptsLimit rate of login attempts, including by way of cookies, for each IP. Fully customizable.
Is Limit Login Attempts Safe to Use in 2026?
Mostly Safe
Score 82/100Limit Login Attempts is generally safe to use though it hasn't been updated recently. 3 past CVEs were resolved. Keep it updated.
The "limit-login-attempts" plugin v1.7.2 exhibits a mixed security posture. On the positive side, the static analysis reveals a commendably small attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, no unprotected entry points. The code also demonstrates good practices by using prepared statements for all SQL queries and including nonce and capability checks. However, a significant concern arises from the very low percentage of properly escaped output (13%), which suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities. The absence of taint analysis results is also noted, which could indicate either no flows were analyzed or none were found with unsanitized paths.
The vulnerability history paints a concerning picture. With a total of three known CVEs, including one critical and one high severity, and the most recent one occurring in April 2023, the plugin has demonstrated past weaknesses in critical areas like improper authentication and XSS. While there are currently no unpatched CVEs, the recurring nature of these vulnerability types, particularly XSS, combined with the static analysis findings of poor output escaping, strongly suggests that the risk of similar vulnerabilities persisting or being reintroduced remains significant. The plugin's strengths lie in its minimal attack surface and secure SQL handling, but these are overshadowed by the high potential for XSS due to insufficient output sanitization and its past security track record.
Key Concerns
- High percentage of unescaped output
- Past critical severity vulnerability
- Past high severity vulnerability
- Past medium severity vulnerability
- Recent critical vulnerability in history
Limit Login Attempts Security Vulnerabilities
CVEs by Year
Severity Breakdown
3 total CVEs
Limit Login Attempts <= 1.7.1 - Authenticated(Subscriber+) Stored Cross-Site Scripting
Limit Login Attempts <= 1.7.1 - Unauthenticated Stored Cross-Site Scripting
Limit Login Attempts <= 1.7.0 - Brute Force Bypass
Limit Login Attempts Code Analysis
Output Escaping
Limit Login Attempts Attack Surface
WordPress Hooks 12
Maintenance & Trust
Limit Login Attempts Maintenance & Trust
Maintenance Signals
Community Trust
Limit Login Attempts Alternatives
All-In-One Security (AIOS) – Security and Firewall
all-in-one-wp-security-and-firewall
Protect your website investment with All-In-One Security (AIOS) – a comprehensive and easy to use security plugin designed especially for WordPress.
WPS Limit Login
wps-limit-login
WPS Limit login limit connection attempts by IP address
Wordfence Login Security
wordfence-login-security
Secure your website with Wordfence Login Security, providing two-factor authentication, login and registration CAPTCHA, and XML-RPC protection.
Titan Anti-spam & Security
anti-spam
Block spam comments, defend against login attempts, and strengthen site security with anti-spam, brute-force protection, and two-factor authentication …
Google Authenticator
google-authenticator
Google Authenticator for your WordPress blog.
Limit Login Attempts Developer Profile
213 plugins · 19.2M total installs
How We Detect Limit Login Attempts
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/limit-login-attempts/css/limit-login-attempts.css/wp-content/plugins/limit-login-attempts/js/limit-login-attempts.js/wp-content/plugins/limit-login-attempts/js/limit-login-attempts.jslimit-login-attempts/css/limit-login-attempts.css?ver=limit-login-attempts/js/limit-login-attempts.js?ver=HTML / DOM Fingerprints
window.limit_login_options