
Two Factor SMS Security & Risk Analysis
wordpress.org/plugins/two-factor-smsAdd SMS support to "Two Factor" feature as a plugin
Is Two Factor SMS Safe to Use in 2026?
Generally Safe
Score 85/100Two Factor SMS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "two-factor-sms" plugin version 0.1.1 presents a mixed security profile. On the positive side, the plugin demonstrates good practices in several areas. It fully utilizes prepared statements for all SQL queries, ensures all output is properly escaped, and the vulnerability history shows no recorded CVEs, suggesting a relatively clean past. Furthermore, the static analysis reveals a very small attack surface with no identified entry points requiring authentication checks, no AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without proper checks. The presence of a capability check is also a positive indicator.
However, there are significant concerns. The most prominent is the use of the `create_function` PHP function, which is deprecated and considered a security risk due to its potential for code injection if not handled with extreme care. The static analysis also identified file operations and external HTTP requests, which, while not inherently insecure, represent potential vectors if not implemented with robust sanitization and validation, though the taint analysis did not reveal any issues here. The complete absence of nonce checks on potential entry points, although the attack surface is currently zero, is a notable weakness that could become a problem if the plugin evolves to include such features without proper security controls. The vulnerability history being empty is positive, but it doesn't negate the inherent risks present in the code itself.
In conclusion, while the plugin currently has a limited attack surface and a clean vulnerability history, the use of `create_function` introduces a significant, albeit latent, risk. The lack of nonce checks, even with a zero attack surface, is a concerning omission for a security-focused plugin. The overall security posture is thus cautious, with clear areas of strength but also critical points of concern that require attention, especially the use of the dangerous `create_function`.
Key Concerns
- Use of dangerous function create_function
- Missing nonce checks on potential entry points
Two Factor SMS Security Vulnerabilities
Two Factor SMS Code Analysis
Dangerous Functions Found
Output Escaping
Two Factor SMS Attack Surface
WordPress Hooks 6
Maintenance & Trust
Two Factor SMS Maintenance & Trust
Maintenance Signals
Community Trust
Two Factor SMS Alternatives
Matoma Two-Factor Authentication
2-factor
Matoma Two-Factor Authentication extends the login process by a 2nd factor to achieve increased security. After the user name and password are request …
SMS Partner
sms-partner
Activer l'A2F ou la connexion via Numéro de téléphone sur votre WordPress grâce à SMS Partner
All-In-One Security (AIOS) – Security and Firewall
all-in-one-wp-security-and-firewall
Protect your website investment with All-In-One Security (AIOS) – a comprehensive and easy to use security plugin designed especially for WordPress.
Wordfence Login Security
wordfence-login-security
Secure your website with Wordfence Login Security, providing two-factor authentication, login and registration CAPTCHA, and XML-RPC protection.
Titan Anti-spam & Security
anti-spam
Block spam comments, defend against login attempts, and strengthen site security with anti-spam, brute-force protection, and two-factor authentication …
Two Factor SMS Developer Profile
6 plugins · 270 total installs
How We Detect Two Factor SMS
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/two-factor-sms/includes/Twilio/Services/Twilio.phpHTML / DOM Fingerprints
twiliotwilio-sectionuser-twilio-sid-wrapuser-twilio-auth-token-wrapuser-twilio-sender-number-wrapuser-twilio-receiver-number-wrap<!-- Ensure only one instance of this class exists in memory at any one time. --><!-- Class constructor. --><!-- Returns the name of the provider. --><!-- Generate the user token. -->+9 moreid="twilio-section"id="twilio-sid"id="twilio-auth-token"id="twilio-sender-number"id="twilio-receiver-number"name="two-factor-sms-code"+2 moreServices_Twilio