Wallet Login Security & Risk Analysis

wordpress.org/plugins/wallet-login

Allow users to login using crypto wallets including WalletConnect, Metamask, Coinbase Wallet and more popular Web3 authentication methods.

50 active installs v1.5.5 PHP 5.6+ WP 4.6+ Updated Dec 17, 2025
bitcoin-connect-walletconnect-web3-fortmatic-toruscryptocrypto-walletloginwallet
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Wallet Login Safe to Use in 2026?

Generally Safe

Score 100/100

Wallet Login has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The wallet-login plugin, version 1.5.5, exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding SQL queries, exclusively using prepared statements, and a high percentage of properly escaped output, mitigating common injection and XSS risks. The absence of known CVEs and critical taint flows is also a strong indicator of overall code quality and a lack of publicly disclosed severe vulnerabilities. However, significant concerns arise from its attack surface. With two unprotected AJAX handlers, this plugin presents a clear avenue for attackers to interact with the plugin's functionality without proper authentication or authorization checks, potentially leading to unauthorized actions or information disclosure. The lack of nonce checks on these AJAX endpoints further exacerbates this risk, as it makes cross-site request forgery (CSRF) attacks more feasible.

The plugin's vulnerability history is clean, suggesting that its developers have been diligent in addressing past issues or that its relatively simple functionality hasn't attracted widespread vulnerabilities. The complete absence of any recorded vulnerabilities is a positive sign. Despite this clean history, the static analysis reveals specific areas for improvement. The unprotected AJAX endpoints are the most pressing concern, as they represent readily exploitable entry points. While the plugin's SQL and output handling are generally strong, the presence of file operations and the lack of capability checks on AJAX handlers warrant attention for a more robust security implementation.

Key Concerns

  • Unprotected AJAX handlers
  • Missing nonce checks on AJAX
  • Missing capability checks on AJAX
  • Some outputs not properly escaped
Vulnerabilities
None known

Wallet Login Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Wallet Login Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
8 prepared
Unescaped Output
2
17 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared8 total queries

Output Escaping

89% escaped19 total outputs
Attack Surface
2 unprotected

Wallet Login Attack Surface

Entry Points4
Unprotected2

AJAX Handlers 2

authwp_ajax_connect_walletpublic\hooks.php:35
noprivwp_ajax_connect_walletpublic\hooks.php:36

Shortcodes 2

[wpbakery_connect_wallet] public\hooks.php:227
[connect_wallet] public\shortcode.php:7
WordPress Hooks 17
filtermanage_users_columnsadmin\admin.php:11
filtermanage_users_columnsadmin\admin.php:28
actionmanage_users_custom_columnadmin\admin.php:30
actionmanage_users_custom_columnadmin\admin.php:43
actionadmin_menuadmin\admin.php:53
actionadmin_initadmin\admin.php:54
actionadd_meta_boxesadmin\page.php:15
actionadmin_headadmin\page.php:16
actionsave_postadmin\page.php:17
actionelementor/widgets/registermain.php:26
actionlogin_enqueue_scriptsmain.php:36
actionwp_enqueue_scriptsmain.php:37
actionwppublic\hooks.php:8
actionlogin_formpublic\hooks.php:204
actionregister_formpublic\hooks.php:205
actioninitpublic\hooks.php:226
actionwp_enqueue_scriptspublic\shortcode.php:2
Maintenance & Trust

Wallet Login Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 17, 2025
PHP min version5.6
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs50
Developer Profile

Wallet Login Developer Profile

M. Ali Saleem

6 plugins · 690 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Wallet Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wallet-login/js/axios.min.js/wp-content/plugins/wallet-login/js/web3.min.js/wp-content/plugins/wallet-login/js/web3modal.js/wp-content/plugins/wallet-login/js/portis.js/wp-content/plugins/wallet-login/js/torus.min.js/wp-content/plugins/wallet-login/js/fortmatic.js/wp-content/plugins/wallet-login/js/walletconnect.min.js/wp-content/plugins/wallet-login/js/web3-login.js+1 more
Script Paths
/wp-content/plugins/wallet-login/js/axios.min.js/wp-content/plugins/wallet-login/js/web3.min.js/wp-content/plugins/wallet-login/js/web3modal.js/wp-content/plugins/wallet-login/js/portis.js/wp-content/plugins/wallet-login/js/torus.min.js/wp-content/plugins/wallet-login/js/fortmatic.js+3 more
Version Parameters
wallet-login/js/axios.min.js?ver=wallet-login/js/web3.min.js?ver=wallet-login/js/web3modal.js?ver=wallet-login/js/portis.js?ver=wallet-login/js/torus.min.js?ver=wallet-login/js/fortmatic.js?ver=wallet-login/js/walletconnect.min.js?ver=wallet-login/js/web3-login.js?ver=wallet-login/js/web3-modal.js?ver=

HTML / DOM Fingerprints

CSS Classes
user-login-msgbutton-secondary
Data Attributes
id="loggedIn"id="ethAddress"id="updatePublicName"id="buttonText"
JS Globals
ajaxurlfortmatic_rpcurl_0fortmatic_chainid_1fortmatic_key_2wallet_connect_infuraid_3portis_id_4+1 more
REST Endpoints
/wp-json/wallet-login/v1/connect
Shortcode Output
<div style="margin: 0 auto;max-width: 600px;margin-top:100px;"><button type="button" onclick="userLoginOut()" id="buttonText" class="Connect Wallet
FAQ

Frequently Asked Questions about Wallet Login