Lock Login Security & Risk Analysis

wordpress.org/plugins/lock-login

Lock Login protects to block attempts to bruteforce your site.

10 active installs v0.1.7 PHP 7.4+ WP + Updated Aug 4, 2023
lockloginlogin-failedsecurityunlock
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Lock Login Safe to Use in 2026?

Generally Safe

Score 85/100

Lock Login has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "lock-login" v0.1.7 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, external HTTP requests, and file operations is commendable. Furthermore, the high percentage of SQL queries utilizing prepared statements and properly escaped output indicates good coding practices for preventing common web vulnerabilities like SQL injection and XSS. The limited attack surface with no unprotected entry points is also a positive sign. However, the complete lack of nonce checks is a significant concern, especially if any of the AJAX handlers or shortcodes (though none are currently present) were to be introduced or modified without proper security. The presence of a cron event, while not inherently insecure, warrants attention to ensure its associated actions are also secured.

The vulnerability history is exceptionally clean, with no recorded CVEs. This suggests either a very well-written plugin or a lack of significant security testing or exploitation attempts in the past. While this is a positive indicator, it should not be seen as a guarantee of future security, especially in light of the identified potential weaknesses like the missing nonce checks.

In conclusion, "lock-login" v0.1.7 demonstrates good defensive coding practices in many areas. The primary weakness lies in the absence of nonce checks, which could become a critical vulnerability if the plugin's functionality evolves to include more interactive or state-changing operations accessible via user input or AJAX. The clean vulnerability history is a strength, but it should be considered alongside the static analysis findings to ensure ongoing security.

Key Concerns

  • Missing nonce checks
Vulnerabilities
None known

Lock Login Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Lock Login Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
12 prepared
Unescaped Output
1
17 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

86% prepared14 total queries

Output Escaping

94% escaped18 total outputs
Attack Surface

Lock Login Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
filtercron_schedulesincludes\App.php:16
actionlocklogin_cronincludes\App.php:17
actionwp_login_failedincludes\App.php:22
actionwp_authenticate_userincludes\App.php:23
filtershake_error_codesincludes\App.php:24
actionadmin_initincludes\App.php:26
actionadmin_menuincludes\App.php:27

Scheduled Events 1

locklogin_cron
Maintenance & Trust

Lock Login Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedAug 4, 2023
PHP min version7.4
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Lock Login Developer Profile

aixeiger

5 plugins · 140 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Lock Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/lock-login/assets/css/styles.css/wp-content/plugins/lock-login/assets/js/scripts.js
Script Paths
/wp-content/plugins/lock-login/assets/js/scripts.js
Version Parameters
lock-login/assets/css/styles.css?ver=lock-login/assets/js/scripts.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Lock Login