WPS Hide Login Security & Risk Analysis

wordpress.org/plugins/wps-hide-login

Change wp-login.php to anything you want.

2.0M active installs v1.9.18 PHP 7.0+ WP 4.1+ Updated Jan 12, 2026
custom-login-urlloginrenamewp-loginwp-login-php
95
A · Safe
CVEs total10
Unpatched0
Last CVEJun 24, 2024
Download
Safety Verdict

Is WPS Hide Login Safe to Use in 2026?

Generally Safe

Score 95/100

WPS Hide Login has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

10 known CVEsLast CVE: Jun 24, 2024Updated 4mo ago
Risk Assessment

The 'wps-hide-login' plugin v1.9.18 exhibits a mixed security posture. On the positive side, the static analysis reveals a very small attack surface, with only one AJAX handler and no REST API routes, shortcodes, or cron events. Crucially, this single entry point appears to be protected by nonce and potentially other checks, as the analysis reports zero unprotected entry points and two nonce checks. The absence of file operations, external HTTP requests, and dangerous functions is also commendable. However, significant concerns arise from the handling of SQL queries. All three SQL queries are not using prepared statements, which is a major security risk for SQL injection. Furthermore, a substantial portion of output (52%) is not properly escaped, increasing the risk of cross-site scripting (XSS) vulnerabilities.

The vulnerability history of this plugin is deeply concerning. With a total of 10 known CVEs, including one high severity, eight medium severity, and one low severity, it indicates a pattern of recurring security flaws. The common types of vulnerabilities, such as exposure of sensitive information, incorrect authorization, protection mechanism failure, improper authorization, and CSRF, suggest fundamental issues with how the plugin handles user input and access control. The fact that the last vulnerability was very recent (2024-06-24) and that there are no currently unpatched vulnerabilities is a slight positive, but the sheer volume and recency of past issues point to a plugin that has historically struggled with robust security implementation.

In conclusion, while the plugin has a small attack surface and some good practices like nonce checks, the lack of prepared statements for all SQL queries and the high percentage of unescaped output are critical weaknesses. The extensive and recent vulnerability history strongly suggests that users should exercise extreme caution. The plugin's core functionality might be simple, but its past demonstrates a propensity for exploitable flaws. Given the nature of the past vulnerabilities and the current code analysis findings, the overall security risk is considerable.

Key Concerns

  • All SQL queries lack prepared statements
  • Significant portion of output not escaped (48% properly)
  • 10 known CVEs, including 1 high and 8 medium
  • Recent vulnerability (2024-06-24)
Vulnerabilities
10 published

WPS Hide Login Security Vulnerabilities

CVEs by Year

1 CVE in 2015
2015
4 CVEs in 2019
2019
1 CVE in 2020
2020
1 CVE in 2021
2021
3 CVEs in 2024
2024
Patched Has unpatched

Severity Breakdown

High
1
Medium
8
Low
1

10 total CVEs

CVE-2024-6289medium · 5.3Exposure of Sensitive Information to an Unauthorized Actor

WPS Hide Login <= 1.9.16.3 - Login Page Disclosure

Jun 24, 2024 Patched in 1.9.16.4 (47d)
CVE-2024-2473medium · 5.3Incorrect Authorization

WPS Hide Login <= 1.9.15.2 - Login Page Disclosure

Jun 10, 2024 Patched in 1.9.16 (2d)
CVE-2023-49748low · 3.7Protection Mechanism Failure

WPS Hide Login <= 1.9.11 - Hidden Login Page Location Disclosure

Jan 10, 2024 Patched in 1.9.12 (14d)
CVE-2021-24917medium · 5.3Incorrect Authorization

WPS Hide Login <= 1.9.0 - Hidden Login Page Location Disclosure

Oct 27, 2021 Patched in 1.9.1 (818d)
CVE-2020-36710medium · 5.3Incorrect Authorization

WPS Hide Login <= 1.5.4.2 - Hidden Login Page Location Disclosure

Jan 27, 2020 Patched in 1.5.5 (1457d)
CVE-2019-15825medium · 5.3Protection Mechanism Failure

WPS Hide Login <= 1.5.2.2 - Login Page Disclosure via 'action=rp'

Jul 23, 2019 Patched in 1.5.3 (1645d)
CVE-2019-15826medium · 5.3Protection Mechanism Failure

WPS Hide Login <= 1.5.2.2 - Login Page Disclosure via Referer Header

Jul 23, 2019 Patched in 1.5.3 (1645d)
CVE-2019-15823medium · 5.3Improper Authorization

WPS Hide Login <= 1.5.2.2 - Login Page Disclosure via 'action=confirmaction'

Jul 23, 2019 Patched in 1.5.3 (1645d)
CVE-2019-15824medium · 5.3Protection Mechanism Failure

WPS Hide Login <= 1.5.2.2 - Login Page Disclosure via 'adminhash'

Jul 22, 2019 Patched in 1.5.3 (1646d)
CVE-2015-9498high · 8.8Cross-Site Request Forgery (CSRF)

WPS Hide Login <= 1.0 - Cross-Site Request Forgery

Apr 27, 2015 Patched in 1.1 (3193d)
Version History

WPS Hide Login Release Timeline

v1.9.18Current3 files changed
v1.9.17.23 files changed
v1.9.17.13 files changed
v1.9.173 files changed
v1.9.16.7
v1.9.16.63 files changed
v1.9.16.5
v1.9.16.4
v1.9.16.31 CVE
v1.9.16.21 CVE
v1.9.16.11 CVE5 files changed
v1.9.161 CVE
v1.9.15.22 CVEs2 files changed
v1.9.15.12 CVEs3 files changed
v1.9.132 CVEs4 files changed
v1.9.122 CVEs5 files changed
v1.9.113 CVEs2 files changed
Code Analysis
Analyzed Mar 16, 2026

WPS Hide Login Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
11
10 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries

Output Escaping

48% escaped21 total outputs
Attack Surface

WPS Hide Login Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_dismiss_admin_noticeclasses\plugin.php:89
WordPress Hooks 29
actionadmin_noticesclasses\plugin.php:16
actionnetwork_admin_noticesclasses\plugin.php:17
actionnetwork_admin_noticesclasses\plugin.php:30
actionadmin_noticesclasses\plugin.php:40
actionwpmu_optionsclasses\plugin.php:49
actionupdate_wpmu_optionsclasses\plugin.php:50
actionwp_before_admin_bar_renderclasses\plugin.php:59
actionadmin_initclasses\plugin.php:62
actionplugins_loadedclasses\plugin.php:63
actioninitclasses\plugin.php:64
actionadmin_noticesclasses\plugin.php:65
actionnetwork_admin_noticesclasses\plugin.php:66
actionwp_loadedclasses\plugin.php:67
actionsetup_themeclasses\plugin.php:68
filtersite_urlclasses\plugin.php:71
filternetwork_site_urlclasses\plugin.php:72
filterwp_redirectclasses\plugin.php:73
filtersite_option_welcome_emailclasses\plugin.php:74
actionadmin_enqueue_scriptsclasses\plugin.php:77
actionadmin_menuclasses\plugin.php:79
actionadmin_initclasses\plugin.php:80
actiontemplate_redirectclasses\plugin.php:82
filterlogin_urlclasses\plugin.php:83
filteruser_request_action_email_contentclasses\plugin.php:85
filtersite_status_testsclasses\plugin.php:87
actionadmin_enqueue_scriptsclasses\plugin.php:90
actionadmin_noticesclasses\plugin.php:91
filtermanage_sites_action_linksclasses\plugin.php:94
actionplugins_loadedwps-hide-login.php:35
Maintenance & Trust

WPS Hide Login Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 12, 2026
PHP min version7.0
Downloads30.7M

Community Trust

Rating96/100
Number of ratings2,103
Active installs2.0M
Developer Profile

WPS Hide Login Developer Profile

Remy Perona

4 plugins · 2.0M total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
1211 days
View full developer profile
Detection Fingerprints

How We Detect WPS Hide Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wps-hide-login/assets/css/backend.css/wp-content/plugins/wps-hide-login/assets/js/backend.js
Script Paths
/wp-content/plugins/wps-hide-login/assets/js/backend.js
Version Parameters
wps-hide-login/assets/css/backend.css?ver=wps-hide-login/assets/js/backend.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WPS Hide Login