[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fMPVk1f56HaEJAUILzS2cfxiVELjbF4Uwti6Zy7S9oYU":3,"$fd2VcN_gtbPQTYJmwwfBUweGZOV0z1tK97fDAu9VsS_s":235,"$fdFfclCM1vEraKABXErlKiPlCfz_-Nl_C0qzjC-jbCvg":240},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30,"discovery_status":31,"vulnerabilities":32,"developer":33,"crawl_stats":29,"alternatives":38,"analysis":144,"fingerprints":220},"wp-login-security-2","WP Login Security 2","1.0.2","andersvinther2","https:\u002F\u002Fprofiles.wordpress.org\u002Fandersvinther2\u002F","\u003Cp>WP Login Security 2 provides enhanced security by requiring users to whitelist their IP address.\u003Cbr \u002F>\nIf the IP address is not recognized, the plugin will send an email to the user with a link that contains a one-time key. Optionally the blog administrator can also be notified.\u003C\u002Fp>\n\u003Cp>If a user logs in from a known IP address no further action is required.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>What does this Plugin do?\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Col>\n\u003Cli>Each time a user logs in, the plugin will compare their existing IP address to the last seen IP address.\u003C\u002Fli>\n\u003Cli>If the IP does not match or no IP addresses have been whitelisted, an email will be sent to the users registered email address.\u003C\u002Fli>\n\u003Cli>The user must login to their email and click the included link, which contains the one-time password.\u003C\u002Fli>\n\u003Cli>The plugin can be configured to also send an email to the blog administrator as well as the user.  \u003C\u002Fli>\n\u003C\u002Fol>\n\u003Cp>\u003Cstrong>Updates from the original plugin\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>This plugin is based on the original \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fextend\u002Fplugins\u002Fwp-login-security\u002F\" rel=\"ugc\">WP Login Security\u003C\u002Fa> plugin developed by joshuascott94.\u003C\u002Fp>\n\u003Cp>Since the original plugin is not supported any longer we took over and made a few updates:\u003C\u002Fp>\n\u003Col>\n\u003Cli>Fixed: Incorrect number of parameters were passed to mt_rand().\u003C\u002Fli>\n\u003Cli>Recoded: The plugin notifications on the login screen only worked when Output Buffering was turned on in php.ini.\u003C\u002Fli>\n\u003Cli>Added buttons to clear whitelist and outstanding activation codes.\u003C\u002Fli>\n\u003Cli>Added code to clean up data on uninstallation.\u003C\u002Fli>\n\u003C\u002Fol>\n","Whitelist User IP addresses. If a user logs in from an unknown IP the plugin sends an email to the user and optionally the admin with a one-time key.",20,8254,88,5,"2012-12-19T13:08:00.000Z","3.5.2","3.0.1","",[20,21,22,23,24],"admin","authentication","login","security","whitelisting","http:\u002F\u002Fwordpress.org\u002Fextend\u002Fplugins\u002Fwp-login-security-2\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-login-security-2.1.0.2.zip",85,0,null,"2026-04-16T10:56:18.058Z","no_bundle",[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":34,"total_installs":11,"avg_security_score":27,"avg_patch_time_days":35,"trust_score":36,"computed_at":37},1,30,84,"2026-05-20T06:04:25.509Z",[39,55,77,102,123],{"slug":40,"name":41,"version":42,"author":43,"author_profile":44,"description":45,"short_description":46,"active_installs":47,"downloaded":48,"rating":28,"num_ratings":28,"last_updated":49,"tested_up_to":50,"requires_at_least":17,"requires_php":18,"tags":51,"homepage":53,"download_link":54,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"authorize-ip-address","Authorize IP Address","1.0.1","jovevskitoni","https:\u002F\u002Fprofiles.wordpress.org\u002Fjovevskitoni\u002F","\u003Cp>Authorize IP Address provides enhanced security by requiring users to whitelist their IP address.\u003Cbr \u002F>\nIf the IP address is not recognized, the plugin will send an email to the user with a link that contains a one-time key. Optionally the blog administrator can also be notified.\u003C\u002Fp>\n\u003Cp>If a user logs in from a known IP address no further action is required.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>What does this Plugin do?\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Col>\n\u003Cli>Prevent from sharing login details. Users can login from only approved ip address from the user via email.\u003C\u002Fli>\n\u003Cli>Each time a user logs in, the plugin will compare their existing IP address to the last seen IP address.\u003C\u002Fli>\n\u003Cli>User First Time login IP address will be automaticly add to whitelist.\u003C\u002Fli>\n\u003Cli>If the IP does not match or no IP addresses have been whitelisted, an email will be sent to the users registered email address.\u003C\u002Fli>\n\u003Cli>The user must login to their email and click the included link, which contains the one-time password.\u003C\u002Fli>\n\u003Cli>The plugin can be configured to also send an email to the blog administrator as well as the user.\u003C\u002Fli>\n\u003C\u002Fol>\n","Authorize IP Address prevent login from unknown IP address.  Whitelist User IP addresses. If a user logs in from an unknown IP the plugin sends an ema &hellip;",10,1767,"2017-02-02T13:42:00.000Z","4.7.33",[21,52,22,23,24],"authorize-ip","http:\u002F\u002Fwordpress.org\u002Fextend\u002Fplugins\u002Fauthorize-ip-address\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fauthorize-ip-address.zip",{"slug":56,"name":57,"version":58,"author":59,"author_profile":60,"description":61,"short_description":62,"active_installs":28,"downloaded":63,"rating":64,"num_ratings":65,"last_updated":66,"tested_up_to":67,"requires_at_least":68,"requires_php":69,"tags":70,"homepage":75,"download_link":76,"security_score":64,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"security-controll-by-reflecters","Security Control by Reflecters","1.1","Reflecters","https:\u002F\u002Fprofiles.wordpress.org\u002Fwearereflecters\u002F","\u003Cp>\u003Cstrong>Security Control by Reflecters\u003C\u002Fstrong> secures WordPress by detecting new devices, blocking them with a password overlay, and alerting users with sirens and banners.\u003C\u002Fp>\n\u003Ch3>Key Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>New Device Detection\u003C\u002Fstrong>: Identifies new devices using a secure cookie-based system.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Siren Password Overlay\u003C\u002Fstrong>: Blocks new devices with a full-screen password prompt (default password: \u003Ccode>2210\u003C\u002Fcode>).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Broadcast Alerts\u003C\u002Fstrong>: Notifies all admin, editor, and author users with a siren sound and warning banner when a new device logs in.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Master Admin Control\u003C\u002Fstrong>: Only the designated master admin can manage settings, block\u002Funblock users, or reset trusted devices.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>IP Blocking\u003C\u002Fstrong>: Temporarily blocks IPs after multiple failed password attempts.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Email Notifications\u003C\u002Fstrong>: Sends alerts to admins, editors, and authors for new device logins, blocks, or trusted devices (configurable).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Trusted Device Management\u003C\u002Fstrong>: Allows users to trust their devices after verification and admins to manage trusted devices.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Customizable Siren\u003C\u002Fstrong>: Upload custom MP3 audio for the siren alert.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Security Headers\u003C\u002Fstrong>: Adds X-Frame-Options, X-Content-Type-Options, and Referrer-Policy headers for admin pages.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>This plugin is ideal for WordPress sites needing robust security for multi-user environments, ensuring only trusted devices access the admin area while keeping authorized users informed of potential threats.\u003C\u002Fp>\n\u003Ch3>Additional Notes\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Default Password\u003C\u002Fstrong>: The default siren stop password is \u003Ccode>2210\u003C\u002Fcode>. Change it in the settings for security.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Security\u003C\u002Fstrong>: The plugin uses nonces for AJAX security, secure cookies for device tracking, and hashes passwords client-side before transmission.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Performance\u003C\u002Fstrong>: Uses transients for temporary data (new device detection, IP blocking) to minimize database load.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Compatibility\u003C\u002Fstrong>: Tested with WordPress 6.8. Requires PHP 7.4+ for modern features like typed arrays.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>For support, contact Reflecters at \u003Ca href=\"mailto:support@reflecters.com\" rel=\"nofollow ugc\">support@reflecters.com\u003C\u002Fa> or visit \u003Ca href=\"https:\u002F\u002Freflecters.com\" rel=\"nofollow ugc\">https:\u002F\u002Freflecters.com\u003C\u002Fa>.\u003C\u002Fp>\n","WordPress security plugin detects new devices, blocks them with a password, triggers siren alerts, and lets master admin control user access.",265,100,21,"2025-09-13T15:40:00.000Z","6.8.5","5.5","7.4",[71,72,73,23,74],"admin-protection","device-authentication","login-security","siren-alert","https:\u002F\u002Fpluginbooster.com\u002Fsecurity-controll","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fsecurity-controll-by-reflecters.1.1.zip",{"slug":78,"name":79,"version":80,"author":81,"author_profile":82,"description":83,"short_description":84,"active_installs":85,"downloaded":86,"rating":87,"num_ratings":88,"last_updated":89,"tested_up_to":90,"requires_at_least":91,"requires_php":92,"tags":93,"homepage":97,"download_link":98,"security_score":99,"vuln_count":100,"unpatched_count":28,"last_vuln_date":101,"fetched_at":30},"all-in-one-wp-security-and-firewall","All-In-One Security (AIOS) – Security and Firewall","5.4.6","David Anderson \u002F Team Updraft","https:\u002F\u002Fprofiles.wordpress.org\u002Fdavidanderson\u002F","\u003Ch3>THE TOP RATED WORDPRESS SECURITY AND FIREWALL PLUGIN\u003C\u002Fh3>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security?utm_source=aios-wp-dir&utm_medium=referral&utm_campaign=plugin-dir&utm_content=aios&utm_creative_format=description\" rel=\"nofollow ugc\">All-in-One Security (AIOS)\u003C\u002Fa> is a WordPress security plugin from the same, trusted team that brought you UpdraftPlus.\u003C\u002Fp>\n\u003Cp>It’s called ‘All-In-One’ because it’s packed full of ways to keep your WordPress website(s) safe and secure.\u003C\u002Fp>\n\u003Cp>It includes:\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Login security features\u003C\u002Fstrong> keep bots at bay. Lock out users based on a configurable number of login attempts, get two-factor authentication and more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>File and database security.\u003C\u002Fstrong> Get notified of file changes that occur outside of normal operations. Block access to key files and scan files and folders to spot insecure permissions.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Firewall.\u003C\u002Fstrong> Get PHP, .htaccess and 6G firewall rules courtesy of Perishable Press. Spot and block fake Google Bots and more!\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Spam prevention.\u003C\u002Fstrong> Prevent annoying spam comments and reduce unnecessary load on the server. Automatically and permanently block IP addresses that exceed a set number of spam comments.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Audit log.\u003C\u002Fstrong> View events happening on your WordPress website. Find out if a plugin or theme has been added, removed, updated and more.\u003C\u002Fp>\n\u003Ch4>WHY ALL-IN-ONE SECURITY?\u003C\u002Fh4>\n\u003Cp>AIOS has a near-perfect \u003Cstrong>4.7 \u002F 5-star user rating\u003C\u002Fstrong> across more than 1 million installs.\u003C\u002Fp>\n\u003Cp>Great for beginners and experts alike. AIOS guides you logically and clearly through each of its features which are all clearly explained. Security features are marked as basic, intermediate and advanced. Each step increases your security score. Turn them on and watch your protection grow!\u003C\u002Fp>\n\u003Cp>We have a large support team of software developers. That means we have the availability and the skillset to help you with the trickiest of queries.\u003C\u002Fp>\n\u003Cp>We comb the WordPress plugin directory for support tickets daily – most queries are responded to within 24 hours.\u003C\u002Fp>\n\u003Cp>\u003Cem>Excellent plugin with numerous well-thought-out options for making a website more secure. I have been using it for years and am very happy with it. I recently had a small problem setting up a website and – even as a non-premium user – I received support very quickly. Highly recommended!\u003C\u002Fem>\u003C\u002Fp>\n\u003Cp>For even more ways to stay safe and secure, upgrade to \u003Ca href=\"https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u002Fpricing?utm_source=aios-wp-dir&utm_medium=referral&utm_campaign=plugin-dir&utm_content=aios_premium&utm_creative_format=description\" rel=\"nofollow ugc\">AIOS Premium\u003C\u002Fa> – it packs a punch security-wise, whilst being \u003Cstrong>extremely cost-competitive\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Ch4>LOGIN SECURITY\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Two-factor authentication (TFA)\u003C\u002Fstrong> – Require TFA for specific user roles. Supports Google Authenticator, Microsoft Authenticator, Authy, and many more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Detect and manage ‘admin’ usernames\u003C\u002Fstrong> – Identify default ‘admin’ usernames and guide users to change them to protect against brute force attacks.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Identify and correct identical login and display names\u003C\u002Fstrong> – Detect cases where the display name matches the username and provide guidance to improve login security.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Prevent user enumeration\u003C\u002Fstrong> – Block unauthorised access to URLs that can reveal sensitive information such as usernames or other details.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Control login attempts\u003C\u002Fstrong> – Prevent brute force attacks by limiting the number of failed login attempts. Choose how many login attempts are allowed, set lockout durations, and more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Force user logout\u003C\u002Fstrong> – Automatically log out users after a specified period of time. Unattended sessions are closed, reducing the risk of unauthorised access.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Manually approve new registrations\u003C\u002Fstrong> – Review and approve new user registrations to prevent spam and fake sign-ups.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Enhance WordPress salt security\u003C\u002Fstrong> – Adds 64 extra characters to WordPress salts, rotating them weekly. Makes cracking passwords virtually impossible, even if your database is stolen.\u003C\u002Fp>\n\u003Ch4>Plugin Support\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>If you have a question or problem with the All-In-One Security plugin, post it on the support forum and we will help you. Premium customers can log queries directly with the team via https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u002F\u003Cbr \u002F>\n\u003Cstrong>Monitor and manage active sessions\u003C\u002Fstrong> – If a user is logged in who shouldn’t be, log them out or add them to a blacklist.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>SPAM PREVENTION\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block spam coming from bots\u003C\u002Fstrong> – Reduce the load on your server and improve the user experience by automatically blocking spam comments from bots.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Monitor spam IP addresses\u003C\u002Fstrong> – Monitor the IP addresses of people or bots leaving spam comments. Choose which ones to block based on a configurable number of comments left.\u003C\u002Fp>\n\u003Ch4>FILE \u002F DATABASE Security\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Scan and fix file permissions\u003C\u002Fstrong> – Scan for insecure file permissions. Click once to fix issues and safeguard critical files and folders.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Disable PHP file editing\u003C\u002Fstrong> – Disable editing of PHP files (such as plugins and themes) via the dashboard. It’s often the first tool that attackers use as it allows for code execution.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Protect sensitive files\u003C\u002Fstrong> – Prevent access to files like readme.html that might reveal information about your WordPress installation.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>File change scanner\u003C\u002Fstrong> – Get notified of any file changes which occur on your system. Exclude files and folders which change as part of normal operations.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Prevent image hotlinking\u003C\u002Fstrong> – Prevent other websites from displaying your images via hotlinking and protect server bandwidth.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Secure database backups\u003C\u002Fstrong> – Perform a database backup via UpdraftPlus from AIOS. Change the default ‘wp_’ prefix to hide your WordPress database from hackers.\u003C\u002Fp>\n\u003Ch4>FIREWALL\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Get .htaccess firewall rules\u003C\u002Fstrong> – Deny access to the .htaccess and wp-config.php files. Disable the server signature and limit file uploads to a configurable size.**\u003C\u002Fp>\n\u003Cp>Block access to the debug.log file and prevent Apache servers from listing the contents of a directory when an index.php file is not present\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Get PHP firewall rules\u003C\u002Fstrong> – PHP firewall rules prevent malicious users from exploiting well-known vulnerabilities in XML-RPC. Safeguard your content by disabling RSS and Atom feeds and avoid cross-site scripting (XSS) attacks.\u003Cbr \u002F>\nBlock fake Google bots and POST requests made by bots – Block fake Google bots and stop bots from making POST requests by blocking IP addresses where the user-agent and referrer fields are blank.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Utilise 6G firewall rules\u003C\u002Fstrong> – Employ flexible blacklist rules to reduce the number of malicious URL requests that hit your website (courtesy of Perishable Press).\u003C\u002Fp>\n\u003Cp>\u003Cstrong>And more\u003C\u002Fstrong> – Blacklist (and whitelist) IP ranges and user agents and block unauthorized access to data by disabling REST API access for non-logged-in requests.\u003C\u002Fp>\n\u003Ch4>TWO-FACTOR AUTHENTICATION ENHANCED [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Two-factor authentication\u003C\u002Fstrong> is included in the free plugin. Upgrade to Premium if you’d like to:\u003Cbr \u002F>\nRequire TFA after a set time period – Mandate TFA for all admins or other roles after their accounts reach a specified age.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Control how often TFA is required\u003C\u002Fstrong> – Set TFA to be required after a certain number of days on trusted devices instead of every login.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Customise design layout\u003C\u002Fstrong> – Adjust the TFA design to match your website’s existing layout and branding.\u003Cbr \u002F>\nEmergency codes – Generate one-time use emergency codes to regain access if you lose your TFA device.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>WordPress Multisite Compatible\u003C\u002Fstrong> – Ensure compatibility with WordPress multisite networks and their sub-sites for consistent TFA application.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Integration with login forms\u003C\u002Fstrong> – Integrate TFA with various login forms, including WooCommerce, Affiliates-WP, Elementor Pro, bbPress, and ‘Theme My Login’ without additional coding.\u003C\u002Fp>\n\u003Ch4>SMART 404 BLOCKING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block IPs based on 404 errors\u003C\u002Fstrong> – Detect hackers probing your URLs via script and bots by the 404 errors they leave behind.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 Configuration\u003C\u002Fstrong> – Set a figure for the maximum number of 404 events allowed before an IP address is blocked. Choose a time period within which the 404 events must occur (e.g., 10 errors within 10 minutes).\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 block by URL string\u003C\u002Fstrong> – Instantly block an IP address if a 404 event includes a specific URL string.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 whitelisting\u003C\u002Fstrong> – Prevent particular IP addresses from being permanently blocked due to 404 events.\u003C\u002Fp>\n\u003Ch4>COUNTRY BLOCKING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block traffic to the entire site or to specific pages or posts\u003C\u002Fstrong> – Useful if you’re an e-commerce site and you want to block sales to some countries for shipping or tax reasons.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Whitelist some users from blocked countries\u003C\u002Fstrong> – Whitelist IP addresses or IP ranges even if they are part of a blocked country.\u003C\u002Fp>\n\u003Ch4>MALWARE SCANNING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Automatic malware scanning\u003C\u002Fstrong> – Detect and protect against the latest malware, trojans, and spyware.\u003Cbr \u002F>\nAlerts you to blacklisting by search engines – Monitor your site for blacklisting by search engines due to malicious code.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Response time monitoring\u003C\u002Fstrong> – Keep track of your website’s response time to identify and address any performance issues.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Uptime monitoring\u003C\u002Fstrong> – Checks your website’s uptime every 5 minutes and alerts you immediately if your site or server goes down.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Advice and malware removal\u003C\u002Fstrong> – Need hands-on advice and support for malware removal? Our team of genuine cybersecurity experts is here to help.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Notification if something’s amiss\u003C\u002Fstrong> – Receive notifications about any issues with your site so you can address problems before they escalate.\u003C\u002Fp>\n\u003Ch4>Plugin Support\u003C\u002Fh4>\n\u003Cp>If you have a question or problem with the All-In-One Security plugin, post it on the support forum and we will help you. Premium customers can log queries directly with the team via https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u003C\u002Fp>\n\u003Ch4>Developers\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>If you are a developer and you need some extra hooks or filters for this plugin then let us know.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Translations\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>All-In-One Security plugin can be translated to any language.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Currently available translations:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>English\u003C\u002Fli>\n\u003Cli>German\u003C\u002Fli>\n\u003Cli>Spanish\u003C\u002Fli>\n\u003Cli>French\u003C\u002Fli>\n\u003Cli>Hungarian\u003C\u002Fli>\n\u003Cli>Italian\u003C\u002Fli>\n\u003Cli>Swedish\u003C\u002Fli>\n\u003Cli>Russian\u003C\u002Fli>\n\u003Cli>Chinese\u003C\u002Fli>\n\u003Cli>Portuguese (Brazil)\u003C\u002Fli>\n\u003Cli>Persian\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Privacy Policy\u003C\u002Fh4>\n\u003Cp>This plugin may collect IP addresses for security reasons such as mitigating brute force login threats and malicious activity.\u003C\u002Fp>\n\u003Cp>The collected information is stored on your server. No information is transmitted to third parties or remote server locations.\u003C\u002Fp>\n\u003Ch4>Usage\u003C\u002Fh4>\n\u003Cp>Go to the settings menu after you activate the plugin and follow the instructions.\u003C\u002Fp>\n\u003Ch3>Usage\u003C\u002Fh3>\n\u003Cp>Go to the settings menu after you activate the plugin and follow the instructions.\u003C\u002Fp>\n","Protect your website investment with All-In-One Security (AIOS) – a comprehensive and easy to use security plugin designed especially for WordPress.",1000000,36261587,94,1699,"2026-03-25T10:40:00.000Z","7.0","5.0","5.6",[94,73,95,23,96],"firewall","malware-scanning","two-factor-authentication","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fall-in-one-wp-security-and-firewall\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fall-in-one-wp-security-and-firewall.5.4.6.zip",93,26,"2024-02-08 00:00:00",{"slug":103,"name":104,"version":105,"author":106,"author_profile":107,"description":108,"short_description":109,"active_installs":85,"downloaded":110,"rating":111,"num_ratings":112,"last_updated":113,"tested_up_to":114,"requires_at_least":115,"requires_php":68,"tags":116,"homepage":118,"download_link":119,"security_score":120,"vuln_count":121,"unpatched_count":28,"last_vuln_date":122,"fetched_at":30},"loginizer","Loginizer","2.0.6","Softaculous","https:\u002F\u002Fprofiles.wordpress.org\u002Fsoftaculous\u002F","\u003Cp>Loginizer is a WordPress plugin which helps you fight against bruteforce attack by blocking login for the IP after it reaches maximum retries allowed. You can blacklist or whitelist IPs for login using Loginizer. You can use various other features like Two Factor Auth, reCAPTCHA, PasswordLess Login, etc. to improve security of your website.\u003C\u002Fp>\n\u003Cp>Loginizer is actively used by more than 1000000+ WordPress websites.\u003C\u002Fp>\n\u003Cp>You can find our official documentation at \u003Ca href=\"https:\u002F\u002Floginizer.com\u002Fdocs\" rel=\"nofollow ugc\">https:\u002F\u002Floginizer.com\u002Fdocs\u003C\u002Fa>. We are also active in our community support forums on \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Floginizer\" rel=\"ugc\">wordpress.org\u003C\u002Fa> if you are one of our free users. Our Premium Support Ticket System is at \u003Ca href=\"https:\u002F\u002Floginizer.deskuss.com\" rel=\"nofollow ugc\">https:\u002F\u002Floginizer.deskuss.com\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Free Features :\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Brute force protection. IPs trying to brute force your website will be blocked for 15 minutes after 3 failed login attempts. After multiple lockouts the IP is blocked for 24 hours. This is the default configuration and can be changed from Loginizer -> Brute force page in WordPress admin panel.\u003C\u002Fli>\n\u003Cli>Failed login attempts logs.\u003C\u002Fli>\n\u003Cli>Blacklist IPs\u003C\u002Fli>\n\u003Cli>Whitelist IPs\u003C\u002Fli>\n\u003Cli>Custom error messages on failed login.\u003C\u002Fli>\n\u003Cli>Permission check for important files and folders.\u003C\u002Fli>\n\u003Cli>Allow only Trusted IP.\u003C\u002Fli>\n\u003Cli>Blocked Screen in place of the Login page.\u003C\u002Fli>\n\u003Cli>Email Notification on successful login.\u003C\u002Fli>\n\u003Cli>Let users login with LinkedIn\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Get Support and Pro Features\u003C\u002Fh4>\n\u003Cp>Get professional support from our experts and pro features to take your site’s security to the next level with \u003Ca href=\"https:\u002F\u002Floginizer.com\u002Fpricing\" rel=\"nofollow ugc\">Loginizer-Security\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>Pro Features :\u003C\u002Fp>\n\u003Cul>\n\u003Cli>MD5 Checksum – of Core WordPress Files. The admin can check and ignore files as well.\u003C\u002Fli>\n\u003Cli>PasswordLess Login – At the time of Login, the username \u002F email address will be asked and an email will be sent to the email address of that account with a temporary link to login.\u003C\u002Fli>\n\u003Cli>Two Factor Auth via Email – On login, an email will be sent to the email address of that account with a temporary 6 digit code to complete the login.\u003C\u002Fli>\n\u003Cli>Two Factor Auth via App – The user can configure the account with a 2FA App like Google Authenticator, Authy, etc.\u003C\u002Fli>\n\u003Cli>Login Challenge Question – The user can setup a Challenge Question and Answer as an additional security layer. After Login, the user will need to answer the question to complete the login.\u003C\u002Fli>\n\u003Cli>reCAPTCHA – Google’s reCAPTCHA v3\u002Fv2, Cloudflare Turnstile, hCAPTCHA can be configured for the Login screen, Comments Section, Registration Form, etc. to prevent automated brute force attacks. Supports WooCommerce as well.\u003C\u002Fli>\n\u003Cli>Rename Login Page – The Admin can rename the login URL (slug) to something different from wp-login.php to prevent automated brute force attacks.\u003C\u002Fli>\n\u003Cli>Rename WP-Admin URL – The Admin area in WordPress is accessed via wp-admin. With loginizer you can change it to anything e.g. site-admin\u003C\u002Fli>\n\u003Cli>CSRF Protection – This helps in preventing CSRF attacks as it updates the admin URL with a session string which makes it difficult and nearly impossible for the attacker to predict the URL.\u003C\u002Fli>\n\u003Cli>Rename Login with Secrecy – If set, then all Login URL’s will still point to wp-login.php and users will have to access the New Login Slug by typing it in the browser.\u003C\u002Fli>\n\u003Cli>Disable XML-RPC – An option to simply disable XML-RPC in WordPress. Most of the WordPress users don’t need XML-RPC and can disable it to prevent automated brute force attacks.\u003C\u002Fli>\n\u003Cli>Rename XML-RPC – The Admin can rename the XML-RPC to something different from xmlrpc.php to prevent automated brute force attacks.\u003C\u002Fli>\n\u003Cli>Username Auto Blacklist – Attackers generally use common usernames like admin, administrator, or variations of your domain name \u002F business name. You can specify such username here and Loginizer will auto-blacklist the IP Address(s) of clients who try to use such username(s).\u003C\u002Fli>\n\u003Cli>New Registration Domain Blacklist – If you would like to ban new registrations from a particular domain, you can use this utility to do so.\u003C\u002Fli>\n\u003Cli>Change the Admin Username – The Admin can rename the admin username to something more difficult.\u003C\u002Fli>\n\u003Cli>Auto Blacklist IPs – IPs will be auto blacklisted, if certain usernames saved by the Admin are used to login by malicious bots \u002F users.\u003C\u002Fli>\n\u003Cli>Disable Pingbacks – Simple way to disable PingBacks.\u003C\u002Fli>\n\u003Cli>SSO – Single Sign-on, let any user access to your WordPress Dashboard without the need to share username or password.\u003C\u002Fli>\n\u003Cli>Limit Concurrent Logins – It prevents user to login from different devices concurrently, you can define how many devices you want to allow, and how you want to restrict the user when concurrent limit is reached.\u003C\u002Fli>\n\u003Cli>Social Login – Users can login or register with their Google, Github, Facebook, X (Twitter), Discord, Twitch, LinkedIn, Microsoft with support for WooCommerce and Ultimate Member.\u003C\u002Fli>\n\u003Cli>Key Less Social Login – Use Loginizer’s Social Auth for easy key less Social login configuration, now supports Google, GitHub, X, LinkedIn more to be added later\u003C\u002Fli>\n\u003Cli>Country Blocking – Block IPs from specific countries to restrict access to your website.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Features in Loginizer include:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Blocks IP after maximum retries allowed\u003C\u002Fli>\n\u003Cli>Extended Lockout after maximum lockouts allowed\u003C\u002Fli>\n\u003Cli>Email notification to admin after max lockouts\u003C\u002Fli>\n\u003Cli>Blacklist IP\u002FIP range\u003C\u002Fli>\n\u003Cli>Whitelist IP\u002FIP range\u003C\u002Fli>\n\u003Cli>Check logs of failed attempts\u003C\u002Fli>\n\u003Cli>Create IP ranges\u003C\u002Fli>\n\u003Cli>Delete IP ranges\u003C\u002Fli>\n\u003Cli>Licensed under LGPLv2.1\u003C\u002Fli>\n\u003Cli>Safe & Secure\u003C\u002Fli>\n\u003C\u002Ful>\n","Loginizer is a WordPress security plugin which helps you fight against bruteforce attacks.",29928058,96,1024,"2026-03-02T12:38:00.000Z","6.9.4","3.0",[117,20,22,103,23],"access","https:\u002F\u002Fwordpress.org\u002Fextend\u002Fplugins\u002Floginizer\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Floginizer.2.0.6.zip",87,8,"2024-11-04 00:00:00",{"slug":124,"name":125,"version":126,"author":127,"author_profile":128,"description":129,"short_description":130,"active_installs":131,"downloaded":132,"rating":133,"num_ratings":134,"last_updated":135,"tested_up_to":136,"requires_at_least":137,"requires_php":18,"tags":138,"homepage":139,"download_link":140,"security_score":141,"vuln_count":142,"unpatched_count":28,"last_vuln_date":143,"fetched_at":30},"limit-login-attempts","Limit Login Attempts","1.7.2","Automattic","https:\u002F\u002Fprofiles.wordpress.org\u002Fautomattic\u002F","\u003Cp>Limit the number of login attempts possible both through normal login as well as using auth cookies.\u003C\u002Fp>\n\u003Cp>By default WordPress allows unlimited login attempts either through the login page or by sending special cookies. This allows passwords (or hashes) to be brute-force cracked with relative ease.\u003C\u002Fp>\n\u003Cp>Limit Login Attempts blocks an Internet address from making further attempts after a specified limit on retries is reached, making a brute-force attack difficult or impossible.\u003C\u002Fp>\n\u003Cp>Features\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Limit the number of retry attempts when logging in (for each IP). Fully customizable\u003C\u002Fli>\n\u003Cli>Limit the number of attempts to log in using auth cookies in same way\u003C\u002Fli>\n\u003Cli>Informs user about remaining retries or lockout time on login page\u003C\u002Fli>\n\u003Cli>Optional logging, optional email notification\u003C\u002Fli>\n\u003Cli>Handles server behind reverse proxy\u003C\u002Fli>\n\u003Cli>It is possible to whitelist IPs using a filter. But you probably shouldn’t. 🙂\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Translations: Bulgarian, Brazilian Portuguese, Catalan, Chinese (Traditional), Czech, Dutch, Finnish, French, German, Hungarian, Norwegian, Persian, Romanian, Russian, Spanish, Swedish, Turkish\u003C\u002Fp>\n\u003Cp>Plugin uses standard actions and filters only.\u003C\u002Fp>\n","Limit rate of login attempts, including by way of cookies, for each IP. Fully customizable.",300000,2284027,92,202,"2023-04-04T19:15:00.000Z","6.2.9","2.8",[21,22,23],"http:\u002F\u002Fdevel.kostdoktorn.se\u002Flimit-login-attempts","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flimit-login-attempts.1.7.2.zip",82,3,"2023-04-10 00:00:00",{"attackSurface":145,"codeSignals":188,"taintFlows":208,"riskAssessment":209,"analyzedAt":219},{"hooks":146,"ajaxHandlers":184,"restRoutes":185,"shortcodes":186,"cronEvents":187,"entryPointCount":28,"unprotectedCount":28},[147,153,157,161,165,169,173,176,179,182],{"type":148,"name":149,"callback":150,"file":151,"line":152},"action","admin_head","wpls2_admin_init","wp-login-security-2.php",40,{"type":148,"name":154,"callback":155,"file":151,"line":156},"init","wpls2_init",41,{"type":148,"name":158,"callback":159,"file":151,"line":160},"login_form","wpls2_login_form",42,{"type":148,"name":162,"callback":163,"file":151,"line":164},"admin_init","wpls2_options_init",43,{"type":148,"name":166,"callback":167,"file":151,"line":168},"admin_menu","wpls2_options_add_page",44,{"type":148,"name":170,"callback":171,"file":151,"line":172},"login_form_unknownip","wpls2_login_action",47,{"type":148,"name":174,"callback":171,"file":151,"line":175},"login_form_registerip",48,{"type":148,"name":177,"callback":171,"file":151,"line":178},"login_form_invalidkey",49,{"type":148,"name":162,"callback":163,"file":180,"line":181},"wpls2-options-page.php",24,{"type":148,"name":166,"callback":167,"file":180,"line":183},25,[],[],[],[],{"dangerousFunctions":189,"sqlUsage":190,"outputEscaping":192,"fileOperations":28,"externalRequests":28,"nonceChecks":28,"capabilityChecks":28,"bundledLibraries":207},[],{"prepared":28,"raw":28,"locations":191},[],{"escaped":28,"rawEcho":193,"locations":194},6,[195,198,200,202,203,205],{"file":151,"line":196,"context":197},136,"raw output",{"file":151,"line":199,"context":197},147,{"file":180,"line":201,"context":197},135,{"file":180,"line":196,"context":197},{"file":180,"line":204,"context":197},169,{"file":180,"line":206,"context":197},177,[],[],{"summary":210,"deductions":211},"The \"wp-login-security-2\" v1.0.2 plugin exhibits a mixed security posture.  On the positive side, the static analysis reveals a very small attack surface with no AJAX handlers, REST API routes, shortcodes, or cron events detected.  Furthermore, all SQL queries are executed using prepared statements, and there are no file operations or external HTTP requests, which are all excellent security practices. The absence of known CVEs and a clean vulnerability history also suggests a relatively stable and secure past for this plugin.\n\nHowever, a significant concern arises from the static analysis indicating that 100% of the 6 detected output operations are not properly escaped. This presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the website through these unescaped outputs. The lack of nonce checks and capability checks, while not immediately indicative of a vulnerability given the limited attack surface, is a weakness that could be exploited if any new entry points were introduced or discovered.\n\nIn conclusion, while the plugin has a strong foundation in terms of its limited attack surface and secure database interactions, the pervasive issue of unescaped output is a critical flaw that needs immediate attention. The lack of historical vulnerabilities is a positive sign, but it does not mitigate the current risk posed by the unescaped outputs. Addressing the output escaping is paramount to improving the overall security of this plugin.",[212,215,217],{"reason":213,"points":214},"100% of outputs not properly escaped",12,{"reason":216,"points":14},"Missing nonce checks",{"reason":218,"points":14},"Missing capability checks","2026-03-16T22:56:01.985Z",{"wat":221,"direct":227},{"assetPaths":222,"generatorPatterns":224,"scriptPaths":225,"versionParams":226},[223],"\u002Fwp-content\u002Fplugins\u002Fwp-login-security-2\u002Fwpls2-options-page.php",[],[],[],{"cssClasses":228,"htmlComments":229,"htmlAttributes":230,"restEndpoints":231,"jsGlobals":232,"shortcodeOutput":234},[],[],[],[],[233],"wpls2_options",[],{"error":236,"url":237,"statusCode":238,"statusMessage":239,"message":239},true,"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fwp-login-security-2\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":142,"versions":241},[242,248,254],{"version":6,"download_url":26,"svn_tag_url":243,"released_at":29,"has_diff":244,"diff_files_changed":245,"diff_lines":29,"trac_diff_url":246,"vulnerabilities":247,"is_current":236},"https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-login-security-2\u002Ftags\u002F1.0.2\u002F",false,[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-login-security-2%2Ftags%2F1.0.1&new_path=%2Fwp-login-security-2%2Ftags%2F1.0.2",[],{"version":42,"download_url":249,"svn_tag_url":250,"released_at":29,"has_diff":244,"diff_files_changed":251,"diff_lines":29,"trac_diff_url":252,"vulnerabilities":253,"is_current":244},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-login-security-2.1.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-login-security-2\u002Ftags\u002F1.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwp-login-security-2%2Ftags%2F1.0.0&new_path=%2Fwp-login-security-2%2Ftags%2F1.0.1",[],{"version":255,"download_url":256,"svn_tag_url":257,"released_at":29,"has_diff":244,"diff_files_changed":258,"diff_lines":29,"trac_diff_url":29,"vulnerabilities":259,"is_current":244},"1.0.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-login-security-2.1.0.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwp-login-security-2\u002Ftags\u002F1.0.0\u002F",[],[]]