No Login User Enumeration Security & Risk Analysis

wordpress.org/plugins/no-login-user-enumeration

This plugin to avoids user enumeration in the Wordpress login form. It does so by simply always returning the same error message, no matter whether on …

10 active installs v0.1 PHP + WP 2.1.0+ Updated Dec 19, 2017
loginsecurityuser-enumeration
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is No Login User Enumeration Safe to Use in 2026?

Generally Safe

Score 85/100

No Login User Enumeration has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "no-login-user-enumeration" plugin v0.1 presents a seemingly strong security posture based on the provided static analysis and vulnerability history. The absence of any dangerous functions, raw SQL queries, unescaped outputs, file operations, external HTTP requests, nonce checks, or capability checks is a positive indicator. Furthermore, the plugin has no recorded vulnerabilities, including no known CVEs, which suggests a history of secure development or minimal exposure.

However, the static analysis results also reveal a complete lack of any identified entry points like AJAX handlers, REST API routes, shortcodes, or cron events. While this implies a very small attack surface, it also means the plugin might not be actively performing any core functionality that would typically require these security measures. The absence of any taint analysis flows, while seemingly good, could also indicate that the analysis was not comprehensive enough to detect potential vulnerabilities in the plugin's limited scope or that the plugin's functionality is so minimal that no data flow is considered for taint analysis.

In conclusion, the plugin exhibits strengths in avoiding common vulnerability patterns. Its clean vulnerability history and the absence of known security issues are significant positives. Nevertheless, the extremely limited attack surface and the lack of specific security checks in the analyzed code, coupled with the absence of taint analysis results, mean that while currently secure, its overall security robustness for potential future functionality is unproven and might require more thorough analysis if the plugin evolves.

Key Concerns

  • No nonce checks present
  • No capability checks present
  • No taint analysis flows analyzed
Vulnerabilities
None known

No Login User Enumeration Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

No Login User Enumeration Release Timeline

v0.1Current
Code Analysis
Analyzed Apr 16, 2026

No Login User Enumeration Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

No Login User Enumeration Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterlogin_errorswp-no-login-user-enumeration.php:14
actionplugins_loadedwp-no-login-user-enumeration.php:26
Maintenance & Trust

No Login User Enumeration Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedDec 19, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

No Login User Enumeration Developer Profile

thomaskonrad

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect No Login User Enumeration

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about No Login User Enumeration