Simple JWT Login – Allows you to use JWT on REST endpoints. Security & Risk Analysis

wordpress.org/plugins/simple-jwt-login

Enhance the WordPress REST API with JWT authentication for secure access by mobile apps, external sites, and third-party services.

5K active installs v3.6.5 PHP 5.5+ WP 4.4.0+ Updated Mar 14, 2026
apiauto-loginjwtregistertokens
94
A · Safe
CVEs total3
Unpatched0
Last CVESep 22, 2025
Safety Verdict

Is Simple JWT Login – Allows you to use JWT on REST endpoints. Safe to Use in 2026?

Generally Safe

Score 94/100

Simple JWT Login – Allows you to use JWT on REST endpoints. has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

3 known CVEsLast CVE: Sep 22, 2025Updated 2mo ago
Risk Assessment

The plugin 'simple-jwt-login' v3.6.5 exhibits a mixed security posture. While it demonstrates good practices in areas like the absence of directly exploitable entry points (no unprotected AJAX or REST API routes) and the exclusive use of prepared statements for SQL queries, significant concerns remain. The static analysis reveals a moderate level of output escaping issues, with only 41% of outputs being properly escaped, indicating a potential for cross-site scripting vulnerabilities. The presence of file operations and external HTTP requests, though not inherently insecure, adds to the potential attack surface that requires careful scrutiny.

The vulnerability history is a substantial red flag. With three known CVEs, including one that is currently unpatched, and a history of high and medium severity vulnerabilities such as Cross-Site Scripting, CSRF, and Inadequate Encryption Strength, there's a clear pattern of past security weaknesses. The recent unpatched vulnerability from September 2025 is particularly concerning, as it suggests ongoing risks that have not been addressed. The absence of any critical severity taint flows is positive, but it does not negate the risks posed by the historical vulnerabilities and the identified output escaping issues.

In conclusion, while 'simple-jwt-login' has some positive security attributes, the unpatched vulnerability and the history of significant security flaws strongly suggest a plugin that has struggled with consistent security maintenance. Users should exercise extreme caution and prioritize updating to a version that addresses the outstanding CVE. The output escaping issues also warrant attention from the developers to mitigate potential XSS risks.

Key Concerns

  • Currently unpatched CVE
  • High severity vulnerabilities in history
  • Medium severity vulnerabilities in history
  • Moderate output escaping issues
  • External HTTP requests
  • File operations
Vulnerabilities
3 published

Simple JWT Login – Allows you to use JWT on REST endpoints. Security Vulnerabilities

CVEs by Year

2 CVEs in 2021
2021
1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

High
2
Medium
1

3 total CVEs

CVE-2025-58648medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Simple JWT Login <= 3.6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting

Sep 22, 2025 Patched in 3.6.5 (177d)
CVE-2021-24804high · 8.8Cross-Site Request Forgery (CSRF)

Simple JWT Login <= 3.2.0 - Cross-Site Request Forgery

Oct 18, 2021 Patched in 3.2.1 (827d)
CVE-2021-24998high · 7.5Inadequate Encryption Strength

Simple JWT Login <= 3.2.1 - Insecure Password Creation

Oct 13, 2021 Patched in 3.3.0 (832d)
Version History

Simple JWT Login – Allows you to use JWT on REST endpoints. Release Timeline

v3.6.5Current
v3.6.41 CVE
v3.6.31 CVE
v3.6.21 CVE
v3.6.11 CVE
v3.6.01 CVE
v3.5.81 CVE
v3.5.71 CVE
v3.5.61 CVE
v3.5.51 CVE
v3.5.41 CVE
v3.5.31 CVE
v3.5.21 CVE
v3.5.11 CVE
v3.5.01 CVE
v3.4.91 CVE
v3.4.81 CVE
v3.4.71 CVE
v3.4.61 CVE
Code Analysis
Analyzed Mar 16, 2026

Simple JWT Login – Allows you to use JWT on REST endpoints. Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
380
267 escaped
Nonce Checks
1
Capability Checks
0
File Operations
2
External Requests
1
Bundled Libraries
0

Output Escaping

41% escaped647 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

3 flows
simple_jwt_login_login_message (simple-jwt-login.php:175)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Simple JWT Login – Allows you to use JWT on REST endpoints. Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[simple-jwt-login:request] simple-jwt-login.php:57
[simple-jwt-login-oauth] simple-jwt-login.php:216
WordPress Hooks 10
filterrest_authentication_errors3rd-party\force_login.php:7
actioninit_graphql_request3rd-party\wp-graphql.php:11
actionrest_api_initroutes\api.php:21
filterrest_authentication_errorsroutes\api.php:65
actionrest_endpointsroutes\api.php:107
actionadmin_menusimple-jwt-login.php:24
actionplugins_loadedsimple-jwt-login.php:25
actionlogin_headsimple-jwt-login.php:158
actionlogin_messagesimple-jwt-login.php:169
actionlogin_footersimple-jwt-login.php:196
Maintenance & Trust

Simple JWT Login – Allows you to use JWT on REST endpoints. Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 14, 2026
PHP min version5.5
Downloads83K

Community Trust

Rating100/100
Number of ratings46
Active installs5K
Developer Profile

Simple JWT Login – Allows you to use JWT on REST endpoints. Developer Profile

Nicu Micle

2 plugins · 5K total installs

77
trust score
Avg Security Score
97/100
Avg Patch Time
612 days
View full developer profile
Detection Fingerprints

How We Detect Simple JWT Login – Allows you to use JWT on REST endpoints.

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-jwt-login/vendor/bootstrap/bootstrap.min.css/wp-content/plugins/simple-jwt-login/css/style.css/wp-content/plugins/simple-jwt-login/vendor/bootstrap/bootstrap.min.js/wp-content/plugins/simple-jwt-login/js/scripts.js/wp-content/plugins/simple-jwt-login/images/simple-jwt-login-16x16.png/wp-content/plugins/simple-jwt-login/css/login.css
Script Paths
/wp-content/plugins/simple-jwt-login/vendor/bootstrap/bootstrap.min.js/wp-content/plugins/simple-jwt-login/js/scripts.js
Version Parameters
simple-jwt-login/vendor/bootstrap/bootstrap.min.css?ver=simple-jwt-login/css/style.css?ver=simple-jwt-login/vendor/bootstrap/bootstrap.min.js?ver=simple-jwt-login/js/scripts.js?ver=

HTML / DOM Fingerprints

CSS Classes
simple-jwt-login-oauth-codesimple-jwt-login-auth-btn
HTML Comments
<!-- GOOGLE -->
Data Attributes
data-provider
Shortcode Output
[simple-jwt-login:request][simple-jwt-login-oauth]
FAQ

Frequently Asked Questions about Simple JWT Login – Allows you to use JWT on REST endpoints.