Limit Login Attempts Security Security & Risk Analysis

wordpress.org/plugins/limit-login-attempts-security

A lightweight version of DoLogin with GeoLocation for login security only. For the full features, please use this free plugin: https://wordpress.

10 active installs v1.0.2 PHP + WP 4.0+ Updated Sep 30, 2019
login-attemptslogin-locklogin-security
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Limit Login Attempts Security Safe to Use in 2026?

Generally Safe

Score 85/100

Limit Login Attempts Security has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The 'limit-login-attempts-security' plugin version 1.0.2 presents a mixed security posture. On the positive side, it demonstrates good practices in handling SQL queries exclusively with prepared statements, incorporates nonce checks, and has no recorded vulnerability history, suggesting a generally stable and well-maintained codebase. However, significant concerns arise from the static analysis. The presence of one unprotected REST API route represents a direct attack vector. Furthermore, the taint analysis indicates two flows with unsanitized paths, which, despite not being classified as critical or high severity, can still lead to vulnerabilities if input is not properly validated or escaped. The low percentage of properly escaped output (18%) is another substantial weakness, increasing the risk of cross-site scripting (XSS) attacks. While the plugin lacks a history of public vulnerabilities, the current code analysis reveals critical areas for improvement. The unprotected REST API route and the high rate of unescaped output are the most pressing issues that need immediate attention to mitigate potential security risks.

Key Concerns

  • Unprotected REST API route
  • Unsanitized paths in taint flows
  • Low percentage of properly escaped output
Vulnerabilities
None known

Limit Login Attempts Security Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Limit Login Attempts Security Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
18
4 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

18% escaped22 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
setting_page (src\core.cls.php:266)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Limit Login Attempts Security Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

GET/wp-json/llas/v1/myipsrc\rest.cls.php:34
WordPress Hooks 4
actionadmin_menusrc\core.cls.php:37
actionlogin_headsrc\core.cls.php:38
filterauthenticatesrc\core.cls.php:40
actionrest_api_initsrc\rest.cls.php:23
Maintenance & Trust

Limit Login Attempts Security Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedSep 30, 2019
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Limit Login Attempts Security Developer Profile

WPDO

6 plugins · 8K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
146 days
View full developer profile
Detection Fingerprints

How We Detect Limit Login Attempts Security

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
llas/v1/myip
FAQ

Frequently Asked Questions about Limit Login Attempts Security