WP-LDAP Security & Risk Analysis

wordpress.org/plugins/wp-ldap

Translates the WordPress user database to an LDAP store of the same; manage your LDAP DIT using your WordPress Dashboard.

10 active installs v0.1.1 PHP + WP 4.6+ Updated May 25, 2017
administrationldapmultisiteusers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-LDAP Safe to Use in 2026?

Generally Safe

Score 85/100

WP-LDAP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'wp-ldap' plugin exhibits a strong security posture in several key areas. The static analysis reveals a complete lack of dangerous functions, exclusively uses prepared statements for SQL queries, and ensures all output is properly escaped. Furthermore, there are no identified file operations, external HTTP requests, or bundled libraries, which can often be sources of vulnerabilities. The attack surface appears to be minimal, with no unprotected AJAX handlers, REST API routes, shortcodes, or cron events. The taint analysis also shows no identified flows with unsanitized paths, indicating that data handling within the plugin is likely robust. The plugin also has no recorded vulnerability history, with zero known CVEs, suggesting a history of secure development and maintenance. However, the complete absence of nonce and capability checks across all identified entry points is a significant concern. While the attack surface is currently reported as zero, the lack of these fundamental security mechanisms means that if any new entry points are introduced or if the current analysis is incomplete, these could be easily exploited. The absence of any recorded vulnerabilities could also be misleading if the plugin has not been extensively tested or if its user base is small, meaning potential vulnerabilities have gone undiscovered.

Key Concerns

  • Missing nonce checks on entry points
  • Missing capability checks on entry points
Vulnerabilities
None known

WP-LDAP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP-LDAP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
10 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped10 total outputs
Attack Surface

WP-LDAP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionplugins_loadedwp-ldap.php:95
actioninitwp-ldap.php:96
actionwpmu_optionswp-ldap.php:97
actionupdate_wpmu_optionswp-ldap.php:98
actionwpmu_new_userwp-ldap.php:99
actionprofile_updatewp-ldap.php:100
actionuser_profile_update_errorswp-ldap.php:101
actionafter_password_resetwp-ldap.php:102
actionshutdownwp-ldap.php:103
Maintenance & Trust

WP-LDAP Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedMay 25, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP-LDAP Developer Profile

Meitar

13 plugins · 2K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-LDAP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP-LDAP