WebPoint Login Security & Risk Analysis

wordpress.org/plugins/webpoint-login

Authorization, registration and password reset with protection from robots.

10 active installs v1.0.2 PHP 5.6+ WP 4.7+ Updated Dec 8, 2018
authorizationlog-inregisterregistrationsign-up
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WebPoint Login Safe to Use in 2026?

Generally Safe

Score 85/100

WebPoint Login has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The webpoint-login v1.0.2 plugin exhibits a generally good security posture based on the provided static analysis. The absence of dangerous functions, a complete reliance on prepared statements for SQL queries, and 100% proper output escaping are significant strengths. The plugin also demonstrates the use of nonces and capability checks, indicating an awareness of common WordPress security practices. Furthermore, the lack of any recorded CVEs in its vulnerability history suggests a history of secure development or effective patching by the developers.

However, there are areas for potential concern. The presence of external HTTP requests, while not inherently a vulnerability, opens the door to potential risks if the external endpoint is compromised or if the request data is not handled securely. A more detailed analysis of the external HTTP request is recommended. The total number of entry points, while all appearing to be protected with authentication or permission checks, still represents an attack surface that warrants ongoing vigilance.

Overall, webpoint-login v1.0.2 appears to be a securely developed plugin with a strong emphasis on secure coding practices. The historical lack of vulnerabilities further reinforces this. The primary recommendation would be to scrutinize the single external HTTP request for potential vulnerabilities and ensure its implementation is robust. The current assessment indicates a low risk profile.

Key Concerns

  • External HTTP requests detected
Vulnerabilities
None known

WebPoint Login Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WebPoint Login Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
26 escaped
Nonce Checks
3
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped26 total outputs
Data Flows
All sanitized

Data Flow Analysis

7 flows
redirect_to_custom_login (webpoint-login.php:575)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WebPoint Login Attack Surface

Entry Points4
Unprotected0

Shortcodes 4

[webpoint-login-form] webpoint-login.php:133
[webpoint-register-form] webpoint-login.php:136
[webpoint-password-lost-form] webpoint-login.php:139
[webpoint-password-reset-form] webpoint-login.php:142
WordPress Hooks 19
actioninitwebpoint-login.php:89
filterauthenticatewebpoint-login.php:92
filterlogin_redirectwebpoint-login.php:95
actionwp_logoutwebpoint-login.php:98
actionlogin_form_loginwebpoint-login.php:101
actionlogin_form_registerwebpoint-login.php:104
actionlogin_form_lostpasswordwebpoint-login.php:107
actionlogin_form_rpwebpoint-login.php:110
actionlogin_form_resetpasswebpoint-login.php:111
actionlogin_form_registerwebpoint-login.php:114
actionlogin_form_lostpasswordwebpoint-login.php:117
actionlogin_form_rpwebpoint-login.php:120
actionlogin_form_resetpasswebpoint-login.php:121
filterretrieve_password_messagewebpoint-login.php:124
filterlogin_form_middlewebpoint-login.php:127
filterauthenticatewebpoint-login.php:130
actionwp_enqueue_scriptswebpoint-login.php:145
actionadmin_menuwebpoint-login.php:148
actionadmin_initwebpoint-login.php:149
Maintenance & Trust

WebPoint Login Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedDec 8, 2018
PHP min version5.6
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WebPoint Login Developer Profile

Dmitriy Denisov

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WebPoint Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/webpoint-login/css/webpoint-login.css/wp-content/plugins/webpoint-login/js/webpoint-login.js
Script Paths
/wp-content/plugins/webpoint-login/js/webpoint-login.js
Version Parameters
webpoint-login/css/webpoint-login.css?ver=webpoint-login/js/webpoint-login.js?ver=

HTML / DOM Fingerprints

CSS Classes
webpoint-loginwebpoint-login-formwebpoint-login-register-formwebpoint-login-password-lost-formwebpoint-login-password-reset-formwebpoint-login-login-formwebpoint-login-register-buttonwebpoint-login-lostpassword-button+2 more
HTML Comments
WebPoint Login
Data Attributes
data-webpoint-login-redirect-urldata-webpoint-login-logged-in-redirect-url
JS Globals
webpoint_login_params
Shortcode Output
[webpoint-login-form][webpoint-register-form][webpoint-password-lost-form][webpoint-password-reset-form]
FAQ

Frequently Asked Questions about WebPoint Login