Wp Auth Security & Risk Analysis

wordpress.org/plugins/wp-auth

WP Auth is a set of tools to make your site new users friendly. It contains shortcodes and options that allows site owners to create registration and …

70 active installs v1 PHP + WP 3.0+ Updated Oct 14, 2012
authlockdownloginshortcodewpadmin
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Wp Auth Safe to Use in 2026?

Generally Safe

Score 85/100

Wp Auth has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The wp-auth v1 plugin exhibits a mixed security posture. On the positive side, it has no known CVEs, indicating a generally stable security history. The absence of dangerous functions, file operations, external HTTP requests, and SQL queries that do not use prepared statements are all good practices. However, significant concerns arise from the static analysis. A complete lack of nonce and capability checks is a major weakness, leaving all entry points susceptible to potential manipulation. Furthermore, 100% of outputs are not properly escaped, posing a high risk for cross-site scripting (XSS) vulnerabilities. The taint analysis reveals two high-severity flows with unsanitized paths, which could lead to severe security compromises if exploited. While the attack surface is relatively small and has no authentication checks, the lack of fundamental security mechanisms like nonces and capability checks, combined with unescaped output and high-severity taint flows, overshadows its positive aspects. This plugin requires immediate attention to address these critical security gaps.

Key Concerns

  • No capability checks
  • No nonce checks
  • 0% output properly escaped
  • High severity taint flows (2)
Vulnerabilities
None known

Wp Auth Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Wp Auth Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
25
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

0% escaped25 total outputs
Data Flows
5 unsanitized

Data Flow Analysis

5 flows5 with unsanitized paths
login_process (wp-auth.php:179)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Wp Auth Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[wpauth-login] wp-auth.php:32
[wpauth-registration] wp-auth.php:33
[wpauth-recover] wp-auth.php:34
WordPress Hooks 7
actionwidgets_initwp-auth-widget.php:70
actionadmin_menuwp-auth.php:25
actionwpwp-auth.php:27
actionwpwp-auth.php:28
actionwpwp-auth.php:29
actionwpwp-auth.php:30
actioninitwp-auth.php:499
Maintenance & Trust

Wp Auth Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedOct 14, 2012
PHP min version
Downloads12K

Community Trust

Rating0/100
Number of ratings0
Active installs70
Developer Profile

Wp Auth Developer Profile

ivansf

1 plugin · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Wp Auth

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-auth/css/wp-auth.css

HTML / DOM Fingerprints

CSS Classes
wp-auth-errorwp-auth-loginerror_msg
Data Attributes
wp-auth-boxstylewp-auth-buttonstylelock-wp-adminhide-top-barwp-auth-loginwp-auth-password+5 more
Shortcode Output
<div id="wp-auth-login"<form action="method="post"><label for="wp-auth-login">Username</label>
FAQ

Frequently Asked Questions about Wp Auth