Login by Magic Security & Risk Analysis

wordpress.org/plugins/magiclabs

Login by Magic plugin replaces the standard WordPress login form with one powered by Magic that enables passwordless email magic link login.

20 active installs v1.0.4 PHP 7.3+ WP 5.5.1+ Updated Aug 29, 2022
authenticationloginmagiclinkpasswordlesssecurity
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Login by Magic Safe to Use in 2026?

Generally Safe

Score 85/100

Login by Magic has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The magiclabs v1.0.4 plugin exhibits a generally good security posture based on the static analysis. The plugin has a small attack surface with no unprotected entry points (AJAX, REST API, shortcodes, or cron events). Notably, there are no dangerous functions used, all SQL queries are prepared, and there are no file operations or external HTTP requests, which are significant security strengths. However, a concern arises from the output escaping, where 67% of outputs are properly escaped, leaving 33% potentially unescaped. This could present a Cross-Site Scripting (XSS) risk if user-supplied data is directly outputted without proper sanitization. The plugin's vulnerability history is clean, with zero recorded CVEs. This, combined with the lack of critical taint analysis findings, suggests a proactive approach to security or a limited scope of functionality. While the lack of explicit capability and nonce checks is a weakness, the absence of direct vulnerabilities in the analyzed code and the limited attack surface mitigate this risk in this specific version.

Key Concerns

  • Output escaping not fully implemented
  • Missing nonce checks on AJAX
  • Missing capability checks
Vulnerabilities
None known

Login by Magic Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Login by Magic Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
10 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped15 total outputs
Attack Surface

Login by Magic Attack Surface

Entry Points2
Unprotected0

REST API Routes 1

GET/wp-json/magic/v1/authincludes\class-login.php:150

Shortcodes 1

[magic_login] includes\class-login.php:50
WordPress Hooks 10
actionadmin_menuincludes\class-admin.php:23
actionadmin_initincludes\class-admin.php:26
filterwoocommerce_locate_templateincludes\class-login.php:54
actionlogin_initincludes\class-login.php:59
actionlogin_enqueue_scriptsincludes\class-login.php:60
actionwp_enqueue_scriptsincludes\class-login.php:64
actionrest_api_initincludes\class-login.php:67
actioninitincludes\class-login.php:70
actioninitwp-magic.php:52
actionplugins_loadedwp-magic.php:55
Maintenance & Trust

Login by Magic Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedAug 29, 2022
PHP min version7.3
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

Login by Magic Developer Profile

Magic

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Login by Magic

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/magiclabs/assets/css/magic-login.css/wp-content/plugins/magiclabs/assets/js/magic-login.js
Script Paths
/wp-content/plugins/magiclabs/assets/js/magic-login.js
Version Parameters
magiclabs/assets/css/magic-login.css?ver=magiclabs/assets/js/magic-login.js?ver=

HTML / DOM Fingerprints

CSS Classes
magic-login-formmagic-login-button
Data Attributes
data-magic-login-client-id
JS Globals
MagicLink
REST Endpoints
/wp-json/magic/v1/auth
Shortcode Output
[magic_login]
FAQ

Frequently Asked Questions about Login by Magic