SQRL Login Security & Risk Analysis

wordpress.org/plugins/sqrl-login

Secure Quick Reliable Login, this plugin will enable logging in using SQRL clients.

100 active installs v2.1.0 PHP 7.2+ WP 5.2.2+ Updated Mar 3, 2022
loginsqrl
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is SQRL Login Safe to Use in 2026?

Generally Safe

Score 85/100

SQRL Login has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The static analysis of sqrl-login v2.1.0 reveals a plugin with a seemingly minimal attack surface, reporting zero AJAX handlers, REST API routes, shortcodes, or cron events. This absence of direct entry points is a positive security indicator. Furthermore, the code signals show no dangerous functions, file operations, or external HTTP requests. All SQL queries utilize prepared statements, and there are no known vulnerabilities (CVEs) in its history. The plugin also appears to handle output escaping reasonably well, with 70% of outputs being properly escaped.

However, a significant concern arises from the taint analysis, which identified 3 flows with unsanitized paths. While no critical or high severity issues were reported in this taint analysis, unsanitized paths are a strong indicator of potential vulnerabilities, especially if they involve user-supplied input that is not properly validated or escaped before being used. The absence of nonce and capability checks across all entry points (even though there are none reported) is a methodological weakness, as any future addition of entry points would be unprotected by default. The lack of documented vulnerabilities in the history is good, but it could also indicate limited testing or analysis, and the taint analysis results suggest areas that warrant further investigation.

In conclusion, while sqrl-login v2.1.0 presents a clean slate in terms of known vulnerabilities and a small attack surface, the presence of unsanitized paths in the taint analysis is a critical area of concern that should be addressed. The plugin's good practices in SQL and absence of dangerous functions are commendable, but the potential for exploitation due to unsanitized paths, coupled with the lack of explicit authorization checks on its (albeit zero) entry points, prevents a full security endorsement.

Key Concerns

  • Unsanitized paths found in taint analysis
  • No nonce checks on entry points
  • No capability checks on entry points
  • Output escaping not fully comprehensive
Vulnerabilities
None known

SQRL Login Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

SQRL Login Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
19
44 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

70% escaped63 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
registration_selection (sqrl-login.php:158)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

SQRL Login Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 22
actionlogin_formsqrl-login.php:79
actionadmin_post_sqrl_loginsqrl-login.php:81
actionadmin_post_nopriv_sqrl_loginsqrl-login.php:82
actionadmin_post_sqrl_logoutsqrl-login.php:83
actionadmin_post_nopriv_sqrl_logoutsqrl-login.php:84
actionadmin_post_sqrl_authsqrl-login.php:85
actionadmin_post_nopriv_sqrl_authsqrl-login.php:86
actionadmin_post_sqrl_check_loginsqrl-login.php:88
actionadmin_post_nopriv_sqrl_check_loginsqrl-login.php:89
actionedit_user_profilesqrl-login.php:91
actionshow_user_profilesqrl-login.php:92
actionlogin_enqueue_scriptssqrl-login.php:94
actionadmin_enqueue_scriptssqrl-login.php:95
actionwp_loginsqrl-login.php:97
filterlogin_messagesqrl-login.php:98
actionadmin_initsqrl-login.php:100
actionadmin_menusqrl-login.php:101
actionregister_formsqrl-login.php:103
actionuser_registersqrl-login.php:104
filtersite_urlsqrl-login.php:106
actionadmin_post_nopriv_sqrl_registration_selectionsqrl-login.php:108
actionadmin_post_nopriv_sqrl_anonymous_registrationsqrl-login.php:109
Maintenance & Trust

SQRL Login Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedMar 3, 2022
PHP min version7.2
Downloads4K

Community Trust

Rating100/100
Number of ratings9
Active installs100
Developer Profile

SQRL Login Developer Profile

kalaspuffar

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SQRL Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sqrl-login/css/sqrl-login-admin.css/wp-content/plugins/sqrl-login/css/sqrl-login-login.css/wp-content/plugins/sqrl-login/js/sqrl-login-admin.js/wp-content/plugins/sqrl-login/js/sqrl-login-login.js
Generator Patterns
SQRL Login v2.1.0
Script Paths
/wp-content/plugins/sqrl-login/js/sqrl-login-admin.js/wp-content/plugins/sqrl-login/js/sqrl-login-login.js
Version Parameters
sqrl-login-admin.css?ver=sqrl-login-login.css?ver=sqrl-login-admin.js?ver=sqrl-login-login.js?ver=

HTML / DOM Fingerprints

CSS Classes
sqrl-login-wrapper
Data Attributes
data-sqrl-login-user-iddata-sqrl-login-register-urldata-sqrl-login-login-urldata-sqrl-login-logout-urldata-sqrl-login-auth-urldata-sqrl-login-check-login-url+2 more
JS Globals
sqrl_login_admin_varssqrl_login_login_vars
FAQ

Frequently Asked Questions about SQRL Login