Limit Login Attempts Security & Risk Analysis

wordpress.org/plugins/limit-login-attempts

Limit rate of login attempts, including by way of cookies, for each IP. Fully customizable.

300K active installs v1.7.2 PHP + WP 2.8+ Updated Apr 4, 2023
authenticationloginsecurity
82
B · Generally Safe
CVEs total3
Unpatched0
Last CVEApr 10, 2023
Safety Verdict

Is Limit Login Attempts Safe to Use in 2026?

Mostly Safe

Score 82/100

Limit Login Attempts is generally safe to use though it hasn't been updated recently. 3 past CVEs were resolved. Keep it updated.

3 known CVEsLast CVE: Apr 10, 2023Updated 2yr ago
Risk Assessment

The "limit-login-attempts" plugin v1.7.2 exhibits a mixed security posture. On the positive side, the static analysis reveals a commendably small attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, no unprotected entry points. The code also demonstrates good practices by using prepared statements for all SQL queries and including nonce and capability checks. However, a significant concern arises from the very low percentage of properly escaped output (13%), which suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities. The absence of taint analysis results is also noted, which could indicate either no flows were analyzed or none were found with unsanitized paths.

The vulnerability history paints a concerning picture. With a total of three known CVEs, including one critical and one high severity, and the most recent one occurring in April 2023, the plugin has demonstrated past weaknesses in critical areas like improper authentication and XSS. While there are currently no unpatched CVEs, the recurring nature of these vulnerability types, particularly XSS, combined with the static analysis findings of poor output escaping, strongly suggests that the risk of similar vulnerabilities persisting or being reintroduced remains significant. The plugin's strengths lie in its minimal attack surface and secure SQL handling, but these are overshadowed by the high potential for XSS due to insufficient output sanitization and its past security track record.

Key Concerns

  • High percentage of unescaped output
  • Past critical severity vulnerability
  • Past high severity vulnerability
  • Past medium severity vulnerability
  • Recent critical vulnerability in history
Vulnerabilities
3

Limit Login Attempts Security Vulnerabilities

CVEs by Year

1 CVE in 2012
2012
2 CVEs in 2023
2023
Patched Has unpatched

Severity Breakdown

Critical
1
High
1
Medium
1

3 total CVEs

CVE-2023-1861medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Limit Login Attempts <= 1.7.1 - Authenticated(Subscriber+) Stored Cross-Site Scripting

Apr 10, 2023 Patched in 1.7.2 (288d)
CVE-2023-1912high · 7.2Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Limit Login Attempts <= 1.7.1 - Unauthenticated Stored Cross-Site Scripting

Apr 6, 2023 Patched in 1.7.2 (292d)
CVE-2012-10001critical · 9.8Improper Authentication

Limit Login Attempts <= 1.7.0 - Brute Force Bypass

Jun 1, 2012 Patched in 1.7.1 (4253d)
Code Analysis
Analyzed Mar 16, 2026

Limit Login Attempts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
48
7 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

13% escaped55 total outputs
Attack Surface

Limit Login Attempts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
actionplugins_loadedlimit-login-attempts.php:88
actionwp_login_failedlimit-login-attempts.php:103
actionauth_cookie_bad_usernamelimit-login-attempts.php:106
actionauth_cookie_bad_hashlimit-login-attempts.php:111
actionauth_cookie_validlimit-login-attempts.php:112
actionauth_cookie_bad_hashlimit-login-attempts.php:114
filterwp_authenticate_userlimit-login-attempts.php:117
filtershake_error_codeslimit-login-attempts.php:118
actionlogin_headlimit-login-attempts.php:119
actionlogin_errorslimit-login-attempts.php:120
actionadmin_menulimit-login-attempts.php:121
actionwp_authenticatelimit-login-attempts.php:128
Maintenance & Trust

Limit Login Attempts Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedApr 4, 2023
PHP min version
Downloads2.3M

Community Trust

Rating92/100
Number of ratings202
Active installs300K
Developer Profile

Limit Login Attempts Developer Profile

Automattic

213 plugins · 19.2M total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
1384 days
View full developer profile
Detection Fingerprints

How We Detect Limit Login Attempts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/limit-login-attempts/css/limit-login-attempts.css/wp-content/plugins/limit-login-attempts/js/limit-login-attempts.js
Script Paths
/wp-content/plugins/limit-login-attempts/js/limit-login-attempts.js
Version Parameters
limit-login-attempts/css/limit-login-attempts.css?ver=limit-login-attempts/js/limit-login-attempts.js?ver=

HTML / DOM Fingerprints

JS Globals
window.limit_login_options
FAQ

Frequently Asked Questions about Limit Login Attempts