Jetpack Login Security & Risk Analysis

wordpress.org/plugins/require-jetpack-login

This plugin simply remove default Login Form from login page. If you are really sick of spam logins that are happening gain and again, then simply use

0 active installs v1.0 PHP 5.2.4+ WP 3.3+ Updated Oct 8, 2017
jetpackloginsecuritywordpress-comwp-com
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Jetpack Login Safe to Use in 2026?

Generally Safe

Score 85/100

Jetpack Login has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "require-jetpack-login" v1.0 plugin exhibits a strong security posture based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, or cron events, especially any without authentication checks, significantly limits its attack surface. Furthermore, the lack of dangerous function calls, file operations, or external HTTP requests, combined with the exclusive use of prepared statements for SQL queries, demonstrates good coding practices. The presence of a capability check, although only one, is also a positive sign. The vulnerability history is clean, with no known CVEs, which suggests a history of secure development or a lack of prior security scrutiny. The taint analysis shows no critical or high severity flows, indicating that data is likely handled safely within the plugin's codebase. The primary concern arising from the static analysis is the 100% unescaped output, which is a notable weakness. Despite the overall positive findings, this unescaped output presents a potential risk for cross-site scripting (XSS) vulnerabilities if user-supplied data is ever processed and displayed without proper sanitization.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

Jetpack Login Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Jetpack Login Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Jetpack Login Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Jetpack Login Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initmy-jetpack-login-disable-default-login-form.php:18
actionadmin_noticesmy-jetpack-login-disable-default-login-form.php:21
actionadmin_menumy-jetpack-login-disable-default-login-form.php:41
filteradmin_footer_textmy-jetpack-login-disable-default-login-form.php:51
filterjetpack_remove_login_formmy-jetpack-login-disable-default-login-form.php:71
Maintenance & Trust

Jetpack Login Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedOct 8, 2017
PHP min version5.2.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Jetpack Login Developer Profile

Harman Singh Hira

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Jetpack Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Jetpack Login