
Trusona for WordPress Security & Risk Analysis
wordpress.org/plugins/trusonaPasswordless 2FA for your WordPress admin account with one-click install. Trusona's FREE passwordless plug-in prevents unauthorized logins, defa …
Is Trusona for WordPress Safe to Use in 2026?
Mostly Safe
Score 78/100Trusona for WordPress is generally safe to use. 1 past CVE were resolved. Keep it updated.
The Trusona plugin v2.0.0 exhibits a mixed security posture. On the positive side, the static analysis reveals a limited attack surface with no identified shortcodes, cron events, or REST API routes. Crucially, all SQL queries are properly prepared, and the majority of output is correctly escaped, indicating good development practices for these common vulnerability areas. The absence of dangerous functions and file operations is also a positive sign.
However, several concerns warrant attention. The taint analysis identified one flow with an unsanitized path, which, while not categorized as critical or high, represents a potential risk for path traversal or file inclusion vulnerabilities. The plugin's history is marred by a known medium-severity vulnerability, specifically "Missing Authorization," which remains unpatched. This is a significant red flag, especially given the plugin's entry points, which include AJAX handlers. The lack of capability checks on AJAX handlers, despite the presence of a nonce check, suggests that while some basic protection is in place, authorization might not be sufficiently robust.
In conclusion, while Trusona v2.0.0 demonstrates some strong security foundations, the unpatched medium-severity vulnerability related to missing authorization and the identified unsanitized path flow are significant weaknesses. The absence of capability checks on all entry points, particularly AJAX handlers, further exacerbates these concerns. These factors suggest a moderate to high risk if the plugin is deployed in a production environment without addressing the outstanding vulnerabilities and bolstering authorization mechanisms.
Key Concerns
- Currently unpatched medium vulnerability
- Flow with unsanitized path (taint analysis)
- Missing capability checks on AJAX handlers
Trusona for WordPress Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Trusona for WordPress <= 2.0.0 - Missing Authorization
Trusona for WordPress Code Analysis
Output Escaping
Data Flow Analysis
Trusona for WordPress Attack Surface
AJAX Handlers 2
WordPress Hooks 9
Maintenance & Trust
Trusona for WordPress Maintenance & Trust
Maintenance Signals
Community Trust
Trusona for WordPress Alternatives
Temporary Login Without Password
temporary-login-without-password
Create self-expiring, temporary admin accounts. Easily share direct login links (no need for username/password) with your developers or editors.
Temporary Login
temporary-login
Create a secure, temporary URL for easy access to your WP admin.
User Verification by PickPlugins
user-verification
Email verification for user registration to protect spam.
Magic Login – Passwordless Authentication for WordPress – Login Without Password
magic-login
Passwordless login for WordPress. Streamline the login process by sending magic links to your users.
Passwordless Login
passwordless-login
Passwordless login form via a simple to use shortcode: [passwordless-login]
Trusona for WordPress Developer Profile
1 plugin · 500 total installs
How We Detect Trusona for WordPress
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/trusona/css/trusona-openid.css/wp-content/plugins/trusona/js/trusona-login.js/wp-content/plugins/trusona/js/trusona-login.jstrusona/style.css?ver=trusona-openid.css?ver=trusona-login.js?ver=HTML / DOM Fingerprints
trusona-login-buttontrusona-login-texttrusona-login-button-textdata-trusona-login-url/wp-json/trusona-openid-callback