[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f4Qhh41yEvLcKXmKWmw-gx5xi5aFQsTpvrVnvJ-FZ5lo":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":23,"download_link":24,"security_score":25,"vuln_count":26,"unpatched_count":27,"last_vuln_date":28,"fetched_at":29,"vulnerabilities":30,"developer":47,"crawl_stats":36,"alternatives":53,"analysis":155,"fingerprints":340},"shibboleth","Shibboleth","2.5.3","michaelryanmcneill","https:\u002F\u002Fprofiles.wordpress.org\u002Fmichaelryanmcneill\u002F","\u003Cp>This plugin is designed to support integrating your WordPress site into your existing identity management infrastructure using a \u003Ca href=\"https:\u002F\u002Fincommon.org\u002Fsoftware\u002Fshibboleth\u002F\" rel=\"nofollow ugc\">Shibboleth\u003C\u002Fa> Service Provider.\u003C\u002Fp>\n\u003Cp>WordPress can be configured so that all standard login requests will be sent to your configured Shibboleth Identity Provider or Discovery Service.  Upon successful authentication, a new WordPress account will be automatically provisioned for the user if one does not already exist. User attributes (username, first name, last name, display name, nickname, and email address) can be synchronized with your enterprise’s system of record each time the user logs into WordPress.\u003C\u002Fp>\n\u003Cp>Finally, the user’s role within WordPress can be automatically set (and continually updated) based on any attribute Shibboleth provides.  For example, you may decide to give users with an eduPersonAffiliation value of \u003Cem>faculty\u003C\u002Fem> the WordPress role of \u003Cem>editor\u003C\u002Fem>, while the eduPersonAffiliation value of \u003Cem>student\u003C\u002Fem> maps to the WordPress role \u003Cem>contributor\u003C\u002Fem>.  Or you may choose to limit access to WordPress altogether using a special eduPersonEntitlement value.\u003C\u002Fp>\n\u003Ch4>Contribute on GitHub\u003C\u002Fh4>\n\u003Cp>This plugin is actively maintained by \u003Ca href=\"https:\u002F\u002Fprofiles.wordpress.org\u002Fmichaelryanmcneill\" rel=\"nofollow ugc\">michaelryanmcneill\u003C\u002Fa> and the WordPress community, \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fmichaelryanmcneill\u002Fshibboleth\" rel=\"nofollow ugc\">using GitHub\u003C\u002Fa>. Contributions are welcome, via pull request, \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fmichaelryanmcneill\u002Fshibboleth\" rel=\"nofollow ugc\">on GitHub\u003C\u002Fa>. Issues can be submitted \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fmichaelryanmcneill\u002Fshibboleth\u002Fissues\" rel=\"nofollow ugc\">on the issue tracker\u003C\u002Fa>.\u003C\u002Fp>\n","Allows WordPress to externalize user authentication and account creation to a Shibboleth Service Provider.",3000,58761,86,7,"2026-02-26T13:22:00.000Z","6.9.4","4.0","5.6",[20,21,22,4],"authentication","login","saml","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fshibboleth\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fshibboleth.2.5.3.zip",100,1,0,"2016-03-02 00:00:00","2026-03-15T15:16:48.613Z",[31],{"id":32,"url_slug":33,"title":34,"description":35,"plugin_slug":4,"theme_slug":36,"affected_versions":37,"patched_in_version":38,"severity":39,"cvss_score":40,"cvss_vector":41,"vuln_type":42,"published_date":28,"updated_date":43,"references":44,"days_to_patch":46},"CVE-2017-14313","shibboleth-reflected-cross-site-scripting","Shibboleth \u003C= 1.6 - Reflected Cross-Site Scripting","The shibboleth_login_form function in shibboleth.php in the Shibboleth plugin before 1.7 for WordPress is prone to an XSS vulnerability due to improper use of add_query_arg().",null,"\u003C=1.6","1.7","medium",6.1,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:C\u002FC:L\u002FI:L\u002FA:N","Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","2024-01-22 19:56:02",[45],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F7cd8ea73-81f3-41fe-bb1e-403d2645ff39?source=api-prod",2883,{"slug":7,"display_name":7,"profile_url":8,"plugin_count":48,"total_installs":49,"avg_security_score":50,"avg_patch_time_days":46,"trust_score":51,"computed_at":52},2,3100,93,74,"2026-04-04T18:11:21.222Z",[54,74,92,115,136],{"slug":55,"name":56,"version":57,"author":58,"author_profile":59,"description":60,"short_description":61,"active_installs":62,"downloaded":63,"rating":27,"num_ratings":27,"last_updated":64,"tested_up_to":65,"requires_at_least":66,"requires_php":67,"tags":68,"homepage":71,"download_link":72,"security_score":73,"vuln_count":27,"unpatched_count":27,"last_vuln_date":36,"fetched_at":29},"ugrm","Shibboleth With LDAP Authorization","2.0.1","warren.brown","https:\u002F\u002Fprofiles.wordpress.org\u002Fwarrenbrown-1\u002F","\u003Cp>Since this plugin extends the Shibboleth plugin, you must first have the Shibboleth plugin, available from https:\u002F\u002Fwordpress.org\u002Fextend\u002Fplugins\u002Fshibboleth\u002F\u003Cbr \u002F>\ninstalled and activated. Otherwise, the plugin will fail to activate as the shibboleth_user_role filter hook will not be registered.\u003C\u002Fp>\n\u003Cp>To use this plugin, you must already have the following setup on your server:\u003Cbr \u002F>\n1. The above Shibbleth plugin.\u003Cbr \u002F>\n2. A UFAD group created for each of the WordPress roles (administrator, editor, author, contributor, and subscriber).\u003C\u002Fp>\n","This plugin extends the Shibboleth plugin to work with UFAD & Shibboleth at the University of Florida. Developed at the Florida Museum of Natural  &hellip;",10,4316,"2018-05-02T18:14:00.000Z","4.9.29","3.2.1","",[21,22,4,69,70],"uf","ufad-authentication","http:\u002F\u002Fwww.floridamuseum.ufl.edu\u002Fomtforge","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fugrm.2.0.zip",85,{"slug":75,"name":76,"version":77,"author":78,"author_profile":79,"description":80,"short_description":81,"active_installs":27,"downloaded":82,"rating":25,"num_ratings":26,"last_updated":83,"tested_up_to":84,"requires_at_least":85,"requires_php":86,"tags":87,"homepage":90,"download_link":91,"security_score":25,"vuln_count":27,"unpatched_count":27,"last_vuln_date":36,"fetched_at":29},"frontegg-saml-sso","Frontegg SAML SSO","1.0.1","Frontegg","https:\u002F\u002Fprofiles.wordpress.org\u002Ffrontegg\u002F","\u003Cp>Frontegg SAML SSO replaces the default WordPress login and logout experiences with seamless SAML authentication via \u003Ca href=\"https:\u002F\u002Ffrontegg.com\" rel=\"nofollow ugc\">Frontegg\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>This plugin is designed for modern SaaS and enterprise WordPress environments where you need to enforce login via an external identity provider (IdP).\u003C\u002Fp>\n\u003Cp>It includes:\u003Cbr \u002F>\n– 🔐 Secure SAML 2.0 login and logout\u003Cbr \u002F>\n– 📋 Admin-friendly configuration of SSO URLs and certificate\u003Cbr \u002F>\n– 📎 Auto-generated SP (Service Provider) values (Entity ID, ACS URL, SLO URL)\u003Cbr \u002F>\n– 🧭 Redirect control after logout\u003Cbr \u002F>\n– 🔄 Auto-redirects from \u003Ccode>wp-login.php\u003C\u002Fcode> to Frontegg\u003Cbr \u002F>\n– ✨ Clean and accessible admin UI using native WordPress components\u003C\u002Fp>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cp>This plugin is licensed under the GPL v2.0 or later. See LICENSE.txt for details.\u003C\u002Fp>\n","Replace the WordPress login and logout flows with secure SAML-based authentication via Frontegg. Easily configure your SSO app from the admin panel.",320,"2025-04-23T23:01:00.000Z","6.8.5","5.0","7.4",[20,21,22,88,89],"single-sign-on","sso","https:\u002F\u002Ffrontegg.com","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ffrontegg-saml-sso.zip",{"slug":93,"name":94,"version":95,"author":96,"author_profile":97,"description":98,"short_description":99,"active_installs":100,"downloaded":101,"rating":102,"num_ratings":103,"last_updated":104,"tested_up_to":16,"requires_at_least":85,"requires_php":18,"tags":105,"homepage":111,"download_link":112,"security_score":50,"vuln_count":113,"unpatched_count":27,"last_vuln_date":114,"fetched_at":29},"all-in-one-wp-security-and-firewall","All-In-One Security (AIOS) – Security and Firewall","5.4.6","David Anderson \u002F Team Updraft","https:\u002F\u002Fprofiles.wordpress.org\u002Fdavidanderson\u002F","\u003Ch3>THE TOP RATED WORDPRESS SECURITY AND FIREWALL PLUGIN\u003C\u002Fh3>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security?utm_source=aios-wp-dir&utm_medium=referral&utm_campaign=plugin-dir&utm_content=aios&utm_creative_format=description\" rel=\"nofollow ugc\">All-in-One Security (AIOS)\u003C\u002Fa> is a WordPress security plugin from the same, trusted team that brought you UpdraftPlus.\u003C\u002Fp>\n\u003Cp>It’s called ‘All-In-One’ because it’s packed full of ways to keep your WordPress website(s) safe and secure.\u003C\u002Fp>\n\u003Cp>It includes:\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Login security features\u003C\u002Fstrong> keep bots at bay. Lock out users based on a configurable number of login attempts, get two-factor authentication and more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>File and database security.\u003C\u002Fstrong> Get notified of file changes that occur outside of normal operations. Block access to key files and scan files and folders to spot insecure permissions.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Firewall.\u003C\u002Fstrong> Get PHP, .htaccess and 6G firewall rules courtesy of Perishable Press. Spot and block fake Google Bots and more!\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Spam prevention.\u003C\u002Fstrong> Prevent annoying spam comments and reduce unnecessary load on the server. Automatically and permanently block IP addresses that exceed a set number of spam comments.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Audit log.\u003C\u002Fstrong> View events happening on your WordPress website. Find out if a plugin or theme has been added, removed, updated and more.\u003C\u002Fp>\n\u003Ch4>WHY ALL-IN-ONE SECURITY?\u003C\u002Fh4>\n\u003Cp>AIOS has a near-perfect \u003Cstrong>4.7 \u002F 5-star user rating\u003C\u002Fstrong> across more than 1 million installs.\u003C\u002Fp>\n\u003Cp>Great for beginners and experts alike. AIOS guides you logically and clearly through each of its features which are all clearly explained. Security features are marked as basic, intermediate and advanced. Each step increases your security score. Turn them on and watch your protection grow!\u003C\u002Fp>\n\u003Cp>We have a large support team of software developers. That means we have the availability and the skillset to help you with the trickiest of queries.\u003C\u002Fp>\n\u003Cp>We comb the WordPress plugin directory for support tickets daily – most queries are responded to within 24 hours.\u003C\u002Fp>\n\u003Cp>\u003Cem>Excellent plugin with numerous well-thought-out options for making a website more secure. I have been using it for years and am very happy with it. I recently had a small problem setting up a website and – even as a non-premium user – I received support very quickly. Highly recommended!\u003C\u002Fem>\u003C\u002Fp>\n\u003Cp>For even more ways to stay safe and secure, upgrade to \u003Ca href=\"https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u002Fpricing?utm_source=aios-wp-dir&utm_medium=referral&utm_campaign=plugin-dir&utm_content=aios_premium&utm_creative_format=description\" rel=\"nofollow ugc\">AIOS Premium\u003C\u002Fa> – it packs a punch security-wise, whilst being \u003Cstrong>extremely cost-competitive\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Ch4>LOGIN SECURITY\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Two-factor authentication (TFA)\u003C\u002Fstrong> – Require TFA for specific user roles. Supports Google Authenticator, Microsoft Authenticator, Authy, and many more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Detect and manage ‘admin’ usernames\u003C\u002Fstrong> – Identify default ‘admin’ usernames and guide users to change them to protect against brute force attacks.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Identify and correct identical login and display names\u003C\u002Fstrong> – Detect cases where the display name matches the username and provide guidance to improve login security.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Prevent user enumeration\u003C\u002Fstrong> – Block unauthorised access to URLs that can reveal sensitive information such as usernames or other details.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Control login attempts\u003C\u002Fstrong> – Prevent brute force attacks by limiting the number of failed login attempts. Choose how many login attempts are allowed, set lockout durations, and more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Force user logout\u003C\u002Fstrong> – Automatically log out users after a specified period of time. Unattended sessions are closed, reducing the risk of unauthorised access.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Manually approve new registrations\u003C\u002Fstrong> – Review and approve new user registrations to prevent spam and fake sign-ups.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Enhance WordPress salt security\u003C\u002Fstrong> – Adds 64 extra characters to WordPress salts, rotating them weekly. Makes cracking passwords virtually impossible, even if your database is stolen.\u003C\u002Fp>\n\u003Ch4>Plugin Support\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>If you have a question or problem with the All-In-One Security plugin, post it on the support forum and we will help you. Premium customers can log queries directly with the team via https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u002F\u003Cbr \u002F>\n\u003Cstrong>Monitor and manage active sessions\u003C\u002Fstrong> – If a user is logged in who shouldn’t be, log them out or add them to a blacklist.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>SPAM PREVENTION\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block spam coming from bots\u003C\u002Fstrong> – Reduce the load on your server and improve the user experience by automatically blocking spam comments from bots.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Monitor spam IP addresses\u003C\u002Fstrong> – Monitor the IP addresses of people or bots leaving spam comments. Choose which ones to block based on a configurable number of comments left.\u003C\u002Fp>\n\u003Ch4>FILE \u002F DATABASE Security\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Scan and fix file permissions\u003C\u002Fstrong> – Scan for insecure file permissions. Click once to fix issues and safeguard critical files and folders.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Disable PHP file editing\u003C\u002Fstrong> – Disable editing of PHP files (such as plugins and themes) via the dashboard. It’s often the first tool that attackers use as it allows for code execution.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Protect sensitive files\u003C\u002Fstrong> – Prevent access to files like readme.html that might reveal information about your WordPress installation.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>File change scanner\u003C\u002Fstrong> – Get notified of any file changes which occur on your system. Exclude files and folders which change as part of normal operations.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Prevent image hotlinking\u003C\u002Fstrong> – Prevent other websites from displaying your images via hotlinking and protect server bandwidth.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Secure database backups\u003C\u002Fstrong> – Perform a database backup via UpdraftPlus from AIOS. Change the default ‘wp_’ prefix to hide your WordPress database from hackers.\u003C\u002Fp>\n\u003Ch4>FIREWALL\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Get .htaccess firewall rules\u003C\u002Fstrong> – Deny access to the .htaccess and wp-config.php files. Disable the server signature and limit file uploads to a configurable size.**\u003C\u002Fp>\n\u003Cp>Block access to the debug.log file and prevent Apache servers from listing the contents of a directory when an index.php file is not present\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Get PHP firewall rules\u003C\u002Fstrong> – PHP firewall rules prevent malicious users from exploiting well-known vulnerabilities in XML-RPC. Safeguard your content by disabling RSS and Atom feeds and avoid cross-site scripting (XSS) attacks.\u003Cbr \u002F>\nBlock fake Google bots and POST requests made by bots – Block fake Google bots and stop bots from making POST requests by blocking IP addresses where the user-agent and referrer fields are blank.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Utilise 6G firewall rules\u003C\u002Fstrong> – Employ flexible blacklist rules to reduce the number of malicious URL requests that hit your website (courtesy of Perishable Press).\u003C\u002Fp>\n\u003Cp>\u003Cstrong>And more\u003C\u002Fstrong> – Blacklist (and whitelist) IP ranges and user agents and block unauthorized access to data by disabling REST API access for non-logged-in requests.\u003C\u002Fp>\n\u003Ch4>TWO-FACTOR AUTHENTICATION ENHANCED [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Two-factor authentication\u003C\u002Fstrong> is included in the free plugin. Upgrade to Premium if you’d like to:\u003Cbr \u002F>\nRequire TFA after a set time period – Mandate TFA for all admins or other roles after their accounts reach a specified age.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Control how often TFA is required\u003C\u002Fstrong> – Set TFA to be required after a certain number of days on trusted devices instead of every login.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Customise design layout\u003C\u002Fstrong> – Adjust the TFA design to match your website’s existing layout and branding.\u003Cbr \u002F>\nEmergency codes – Generate one-time use emergency codes to regain access if you lose your TFA device.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>WordPress Multisite Compatible\u003C\u002Fstrong> – Ensure compatibility with WordPress multisite networks and their sub-sites for consistent TFA application.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Integration with login forms\u003C\u002Fstrong> – Integrate TFA with various login forms, including WooCommerce, Affiliates-WP, Elementor Pro, bbPress, and ‘Theme My Login’ without additional coding.\u003C\u002Fp>\n\u003Ch4>SMART 404 BLOCKING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block IPs based on 404 errors\u003C\u002Fstrong> – Detect hackers probing your URLs via script and bots by the 404 errors they leave behind.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 Configuration\u003C\u002Fstrong> – Set a figure for the maximum number of 404 events allowed before an IP address is blocked. Choose a time period within which the 404 events must occur (e.g., 10 errors within 10 minutes).\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 block by URL string\u003C\u002Fstrong> – Instantly block an IP address if a 404 event includes a specific URL string.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 whitelisting\u003C\u002Fstrong> – Prevent particular IP addresses from being permanently blocked due to 404 events.\u003C\u002Fp>\n\u003Ch4>COUNTRY BLOCKING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block traffic to the entire site or to specific pages or posts\u003C\u002Fstrong> – Useful if you’re an e-commerce site and you want to block sales to some countries for shipping or tax reasons.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Whitelist some users from blocked countries\u003C\u002Fstrong> – Whitelist IP addresses or IP ranges even if they are part of a blocked country.\u003C\u002Fp>\n\u003Ch4>MALWARE SCANNING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Automatic malware scanning\u003C\u002Fstrong> – Detect and protect against the latest malware, trojans, and spyware.\u003Cbr \u002F>\nAlerts you to blacklisting by search engines – Monitor your site for blacklisting by search engines due to malicious code.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Response time monitoring\u003C\u002Fstrong> – Keep track of your website’s response time to identify and address any performance issues.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Uptime monitoring\u003C\u002Fstrong> – Checks your website’s uptime every 5 minutes and alerts you immediately if your site or server goes down.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Advice and malware removal\u003C\u002Fstrong> – Need hands-on advice and support for malware removal? Our team of genuine cybersecurity experts is here to help.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Notification if something’s amiss\u003C\u002Fstrong> – Receive notifications about any issues with your site so you can address problems before they escalate.\u003C\u002Fp>\n\u003Ch4>Plugin Support\u003C\u002Fh4>\n\u003Cp>If you have a question or problem with the All-In-One Security plugin, post it on the support forum and we will help you. Premium customers can log queries directly with the team via https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u003C\u002Fp>\n\u003Ch4>Developers\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>If you are a developer and you need some extra hooks or filters for this plugin then let us know.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Translations\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>All-In-One Security plugin can be translated to any language.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Currently available translations:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>English\u003C\u002Fli>\n\u003Cli>German\u003C\u002Fli>\n\u003Cli>Spanish\u003C\u002Fli>\n\u003Cli>French\u003C\u002Fli>\n\u003Cli>Hungarian\u003C\u002Fli>\n\u003Cli>Italian\u003C\u002Fli>\n\u003Cli>Swedish\u003C\u002Fli>\n\u003Cli>Russian\u003C\u002Fli>\n\u003Cli>Chinese\u003C\u002Fli>\n\u003Cli>Portuguese (Brazil)\u003C\u002Fli>\n\u003Cli>Persian\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Privacy Policy\u003C\u002Fh4>\n\u003Cp>This plugin may collect IP addresses for security reasons such as mitigating brute force login threats and malicious activity.\u003C\u002Fp>\n\u003Cp>The collected information is stored on your server. No information is transmitted to third parties or remote server locations.\u003C\u002Fp>\n\u003Ch4>Usage\u003C\u002Fh4>\n\u003Cp>Go to the settings menu after you activate the plugin and follow the instructions.\u003C\u002Fp>\n\u003Ch3>Usage\u003C\u002Fh3>\n\u003Cp>Go to the settings menu after you activate the plugin and follow the instructions.\u003C\u002Fp>\n","Protect your website investment with All-In-One Security (AIOS) – a comprehensive and easy to use security plugin designed especially for WordPress.",1000000,36139406,94,1693,"2026-01-28T22:15:00.000Z",[106,107,108,109,110],"firewall","login-security","malware-scanning","security","two-factor-authentication","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fall-in-one-wp-security-and-firewall\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fall-in-one-wp-security-and-firewall.5.4.6.zip",26,"2024-02-08 00:00:00",{"slug":116,"name":117,"version":118,"author":119,"author_profile":120,"description":121,"short_description":122,"active_installs":123,"downloaded":124,"rating":125,"num_ratings":126,"last_updated":127,"tested_up_to":128,"requires_at_least":129,"requires_php":67,"tags":130,"homepage":131,"download_link":132,"security_score":133,"vuln_count":134,"unpatched_count":27,"last_vuln_date":135,"fetched_at":29},"limit-login-attempts","Limit Login Attempts","1.7.2","Automattic","https:\u002F\u002Fprofiles.wordpress.org\u002Fautomattic\u002F","\u003Cp>Limit the number of login attempts possible both through normal login as well as using auth cookies.\u003C\u002Fp>\n\u003Cp>By default WordPress allows unlimited login attempts either through the login page or by sending special cookies. This allows passwords (or hashes) to be brute-force cracked with relative ease.\u003C\u002Fp>\n\u003Cp>Limit Login Attempts blocks an Internet address from making further attempts after a specified limit on retries is reached, making a brute-force attack difficult or impossible.\u003C\u002Fp>\n\u003Cp>Features\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Limit the number of retry attempts when logging in (for each IP). Fully customizable\u003C\u002Fli>\n\u003Cli>Limit the number of attempts to log in using auth cookies in same way\u003C\u002Fli>\n\u003Cli>Informs user about remaining retries or lockout time on login page\u003C\u002Fli>\n\u003Cli>Optional logging, optional email notification\u003C\u002Fli>\n\u003Cli>Handles server behind reverse proxy\u003C\u002Fli>\n\u003Cli>It is possible to whitelist IPs using a filter. But you probably shouldn’t. 🙂\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Translations: Bulgarian, Brazilian Portuguese, Catalan, Chinese (Traditional), Czech, Dutch, Finnish, French, German, Hungarian, Norwegian, Persian, Romanian, Russian, Spanish, Swedish, Turkish\u003C\u002Fp>\n\u003Cp>Plugin uses standard actions and filters only.\u003C\u002Fp>\n","Limit rate of login attempts, including by way of cookies, for each IP. Fully customizable.",300000,2279689,92,202,"2023-04-04T19:15:00.000Z","6.2.9","2.8",[20,21,109],"http:\u002F\u002Fdevel.kostdoktorn.se\u002Flimit-login-attempts","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flimit-login-attempts.1.7.2.zip",82,3,"2023-04-10 00:00:00",{"slug":137,"name":138,"version":139,"author":140,"author_profile":141,"description":142,"short_description":143,"active_installs":144,"downloaded":145,"rating":146,"num_ratings":147,"last_updated":148,"tested_up_to":84,"requires_at_least":149,"requires_php":67,"tags":150,"homepage":67,"download_link":152,"security_score":153,"vuln_count":134,"unpatched_count":27,"last_vuln_date":154,"fetched_at":29},"wps-limit-login","WPS Limit Login","1.5.9.2","NicolasKulka","https:\u002F\u002Fprofiles.wordpress.org\u002Fnicolaskulka\u002F","\u003Ch4>Français\u003C\u002Fh4>\n\u003Cp>Limitez le nombre de tentatives de connexion possibles via la page de connexion et en utilisant les cookies auth.\u003Cbr \u002F>\nWordPress par défaut permet des tentatives de connexion illimitées soit via la page de connexion ou en envoyant des cookies spéciaux. Cela permet aux mots de passe (ou hashs) d’être craqués via la force brute relativement facilement.\u003Cbr \u002F>\nWPS Limit login limite les tentatives de connexion et bloque l’envoi d’autres tentatives à une adresse Internet après l’atteinte d’une limite spécifiée, ce qui rend une attaque par force brute difficile, voire impossible.\u003C\u002Fp>\n\u003Cp>Caractéristiques:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Limiter le nombre de nouvelles tentatives lors de la connexion (pour chaque IP). Ceci est entièrement personnalisable.\u003C\u002Fli>\n\u003Cli>Limitez le nombre de tentatives de connexion en utilisant des cookies d’autorisation de la même manière.\u003C\u002Fli>\n\u003Cli>Informe l’utilisateur sur les tentatives restantes ou le temps de verrouillage sur la page de connexion.\u003C\u002Fli>\n\u003Cli>Journalisation et notification par courriel facultative.\u003C\u002Fli>\n\u003Cli>Gère le serveur derrière le proxy inverse (reverse proxy).\u003C\u002Fli>\n\u003Cli>Il est possible de mettre en liste blanche \u002F liste noire les adresses IP.\u003C\u002Fli>\n\u003Cli>Compatibilité avec le pare-feu du site Web Sucuri.\u003C\u002Fli>\n\u003Cli>Protection de passerelle \u003Cstrong>XMLRPC\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Woocommerce\u003C\u002Fstrong> protection de la page de connexion.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Compatibilité multi-sites\u003C\u002Fstrong> avec des paramètres MU supplémentaires.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Pour en savoir plus lisez l’article suivant : \u003Ca href=\"https:\u002F\u002Fwpformation.com\u002Fwps-limit-login\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fwpformation.com\u002Fwps-limit-login\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Ce plugin vous est gentiment proposé par \u003Ca href=\"https:\u002F\u002Fwww.wpserveur.net\u002F?refwps=14&campaign=wpslimitlogin\" rel=\"nofollow ugc\">WPServeur\u003C\u002Fa> l’hébergeur spécialisé WordPress.\u003C\u002Fp>\n\u003Cp>Découvrez également nos autres extensions gratuites :\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Ffr.wordpress.org\u002Fplugins\u002Fwps-hide-login\u002F\" rel=\"nofollow ugc\">WPS Hide Login\u003C\u002Fa> pour changer votre URL de connexion en ce que vous voulez.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Ffr.wordpress.org\u002Fplugins\u002Fwps-bidouille\u002F\" rel=\"nofollow ugc\">WPS Bidouille\u003C\u002Fa> pour optimiser votre WordPress et faire le plein d’infos.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Ffr.wordpress.org\u002Fplugins\u002Fwps-cleaner\u002F\" rel=\"nofollow ugc\">WPS Cleaner\u003C\u002Fa> pour nettoyer votre site WordPress.\u003C\u002Fp>\n\u003Cp>Ce plugin est seulement maintenu, ce qui signifie que nous ne garantissons pas un support gratuit. Envisagez de signaler un problème et soyez patient.\u003C\u002Fp>\n\u003Ch4>English\u003C\u002Fh4>\n\u003Cp>Limit the number of login attempts that possible both through the normal login as well as using the auth cookies.\u003Cbr \u002F>\nWordPress by default allows unlimited login attempts either through the login page or by sending special cookies. This allows passwords (or hashes) to be cracked via brute-force relatively easily.\u003Cbr \u002F>\nWPS Limit login blocks an Internet address from making further attempts after a specified limit on retries has been reached, making a brute-force attack difficult or impossible.\u003C\u002Fp>\n\u003Cp>Features:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Limit the number of retry attempts when logging in (per each IP). This is fully customizable.\u003C\u002Fli>\n\u003Cli>Limit the number of attempts to log in using authorization cookies in the same way.\u003C\u002Fli>\n\u003Cli>Informs the user about the remaining retries or lockout time on the login page.\u003C\u002Fli>\n\u003Cli>Optional logging and optional email notification.\u003C\u002Fli>\n\u003Cli>Handles server behind the reverse proxy.\u003C\u002Fli>\n\u003Cli>It is possible to whitelist\u002Fblacklist IPs.\u003C\u002Fli>\n\u003Cli>Sucuri Website Firewall compatibility.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>XMLRPC\u003C\u002Fstrong> gateway protection.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Woocommerce\u003C\u002Fstrong> login page protection.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Multi-site\u003C\u002Fstrong> compatibility with extra MU settings.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>To learn more read the following article: \u003Ca href=\"https:\u002F\u002Fwpformation.com\u002Fwps-limit-login\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fwpformation.com\u002Fwps-limit-login\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>This plugin is kindly proposed by \u003Ca href=\"https:\u002F\u002Fwww.wpserveur.net\u002F?refwps=14&campaign=wpslimitlogin\" rel=\"nofollow ugc\">WPServeur\u003C\u002Fa> the specialized WordPress web host.\u003C\u002Fp>\n\u003Cp>Découvrez également nos autres extensions gratuites :\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwps-hide-login\u002F\" rel=\"ugc\">WPS Hide Login\u003C\u002Fa> to change your login URL to whatever you want.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwps-bidouille\u002F\" rel=\"ugc\">WPS Bidouille\u003C\u002Fa> to optimize your WordPress and get more info.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwps-cleaner\u002F\" rel=\"ugc\">WPS Cleaner\u003C\u002Fa> to clean your WordPress site.\u003C\u002Fp>\n\u003Cp>This plugin is only maintained, which means we do not guarantee free support. Consider reporting a problem and be patient.\u003C\u002Fp>\n","WPS Limit login limit connection attempts by IP address",100000,931525,98,83,"2025-06-24T07:45:00.000Z","4.2",[20,151,21,109,137],"limit-login","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwps-limit-login.1.5.9.2.zip",96,"2019-07-23 00:00:00",{"attackSurface":156,"codeSignals":296,"taintFlows":309,"riskAssessment":329,"analyzedAt":339},{"hooks":157,"ajaxHandlers":292,"restRoutes":293,"shortcodes":294,"cronEvents":295,"entryPointCount":27,"unprotectedCount":27},[158,164,168,174,178,181,185,189,193,196,199,202,206,208,211,215,220,224,227,231,235,239,243,247,251,255,258,262,266,270,273,277,280,284,288],{"type":159,"name":160,"callback":161,"file":162,"line":163},"action","admin_menu","shibboleth_admin_panels","options-admin.php",43,{"type":159,"name":165,"callback":166,"file":162,"line":167},"network_admin_menu","shibboleth_network_admin_panels",55,{"type":169,"name":170,"callback":171,"file":172,"line":173},"filter","show_password_fields","__return_false","options-user.php",25,{"type":159,"name":175,"callback":176,"file":172,"line":177},"admin_footer-user-edit.php","shibboleth_disable_managed_fields",27,{"type":159,"name":179,"callback":176,"file":172,"line":180},"admin_footer-profile.php",29,{"type":159,"name":182,"callback":183,"file":172,"line":184},"personal_options","shibboleth_edit_user_options",32,{"type":159,"name":186,"callback":187,"file":172,"line":188},"show_user_profile","shibboleth_change_password_profile_link",118,{"type":159,"name":190,"callback":191,"file":172,"line":192},"personal_options_update","shibboleth_prevent_managed_fields_update",156,{"type":159,"name":194,"callback":191,"file":172,"line":195},"edit_user_profile_update",157,{"type":159,"name":186,"callback":197,"file":172,"line":198},"shibboleth_link_accounts_button",190,{"type":159,"name":200,"callback":197,"file":172,"line":201},"edit_user_profile",191,{"type":159,"name":203,"callback":204,"file":172,"line":205},"current_screen","shibboleth_link_accounts",289,{"type":169,"name":170,"callback":171,"file":172,"line":207},303,{"type":159,"name":203,"callback":209,"file":172,"line":210},"shibboleth_disable_password_changes",307,{"type":159,"name":212,"callback":213,"file":172,"line":214},"admin_notices","shibboleth_link_accounts_notice",333,{"type":159,"name":216,"callback":217,"file":218,"line":219},"admin_init","shibboleth_activate_plugin","shibboleth.php",33,{"type":159,"name":221,"callback":222,"file":218,"line":223},"init","shibboleth_auto_login",174,{"type":159,"name":221,"callback":225,"file":218,"line":226},"shibboleth_admin_hooks",416,{"type":169,"name":228,"callback":229,"priority":62,"file":218,"line":230},"allowed_redirect_hosts","closure",485,{"type":169,"name":232,"callback":233,"priority":62,"file":218,"line":234},"authenticate","shibboleth_authenticate",570,{"type":169,"name":228,"callback":236,"priority":237,"file":218,"line":238},"shibboleth_allowed_redirect_hosts",20,573,{"type":159,"name":240,"callback":241,"file":218,"line":242},"login_form_shibboleth","shibboleth_login_form_shibboleth",576,{"type":159,"name":244,"callback":245,"file":218,"line":246},"retrieve_password","shibboleth_retrieve_password",630,{"type":169,"name":248,"callback":249,"file":218,"line":250},"login_url","shibboleth_login_url",655,{"type":159,"name":252,"callback":253,"priority":237,"file":218,"line":254},"wp_logout","shibboleth_logout",673,{"type":169,"name":256,"callback":171,"file":218,"line":257},"send_email_change_email",1084,{"type":169,"name":259,"callback":260,"file":218,"line":261},"shibboleth_user_nicename","sanitize_title",1096,{"type":159,"name":263,"callback":264,"file":218,"line":265},"admin_enqueue_scripts","shibboleth_admin_enqueue_scripts",1110,{"type":159,"name":267,"callback":268,"file":218,"line":269},"login_enqueue_scripts","shibboleth_login_enqueue_scripts",1126,{"type":169,"name":271,"callback":171,"file":218,"line":272},"allow_password_reset",1141,{"type":159,"name":274,"callback":275,"file":218,"line":276},"login_init","shibboleth_disable_login",1150,{"type":159,"name":267,"callback":278,"file":218,"line":279},"shibboleth_disable_login_form",1178,{"type":169,"name":281,"callback":282,"file":218,"line":283},"lostpassword_url","shibboleth_custom_password_reset_url",1195,{"type":159,"name":285,"callback":286,"file":218,"line":287},"login_form","shibboleth_login_form",1248,{"type":159,"name":289,"callback":290,"file":218,"line":291},"plugins_loaded","shibboleth_load_textdomain",1289,[],[],[],[],{"dangerousFunctions":297,"sqlUsage":298,"outputEscaping":300,"fileOperations":27,"externalRequests":27,"nonceChecks":14,"capabilityChecks":26,"bundledLibraries":308},[],{"prepared":27,"raw":27,"locations":299},[],{"escaped":301,"rawEcho":48,"locations":302},149,[303,306],{"file":162,"line":304,"context":305},837,"raw output",{"file":162,"line":307,"context":305},857,[],[310],{"entryPoint":311,"graph":312,"unsanitizedCount":27,"severity":328},"\u003Cshibboleth> (shibboleth.php:0)",{"nodes":313,"edges":325},[314,319],{"id":315,"type":316,"label":317,"file":218,"line":318},"n0","source","$_REQUEST",521,{"id":320,"type":321,"label":322,"file":218,"line":323,"wp_function":324},"n1","sink","echo() [XSS]",1241,"echo",[326],{"from":315,"to":320,"sanitized":327},true,"low",{"summary":330,"deductions":331},"The shibboleth plugin version 2.5.3 demonstrates a generally strong security posture based on the provided static analysis.  It exhibits excellent practices by having no identified dangerous functions, no raw SQL queries, and a very high percentage of properly escaped output. The absence of file operations and external HTTP requests further reduces potential attack vectors.  The presence of nonce and capability checks, though limited, indicates an awareness of security fundamentals.  However, the total lack of entry points identified in the static analysis is somewhat unusual for a functional plugin, which could imply either a very limited scope or a potential blind spot in the analysis itself. The vulnerability history shows a single medium-severity vulnerability from 2016 related to Cross-site Scripting. While this is old and currently unpatched CVEs are zero, it serves as a reminder that past vulnerabilities can recur if not meticulously addressed in subsequent development.",[332,335,337],{"reason":333,"points":334},"One medium vulnerability in history",5,{"reason":336,"points":134},"Limited capability checks (1)",{"reason":338,"points":48},"Limited nonce checks (7)","2026-03-16T18:19:04.367Z",{"wat":341,"direct":346},{"assetPaths":342,"generatorPatterns":343,"scriptPaths":344,"versionParams":345},[],[],[],[],{"cssClasses":347,"htmlComments":348,"htmlAttributes":349,"restEndpoints":350,"jsGlobals":351,"shortcodeOutput":352},[],[],[],[],[],[]]