WPS Limit Login Security & Risk Analysis

wordpress.org/plugins/wps-limit-login

WPS Limit login limit connection attempts by IP address

100K active installs v1.5.9.2 PHP + WP 4.2+ Updated Jun 24, 2025
authenticationlimit-loginloginsecuritywps-limit-login
96
A · Safe
CVEs total3
Unpatched0
Last CVEJul 23, 2019
Download
Safety Verdict

Is WPS Limit Login Safe to Use in 2026?

Generally Safe

Score 96/100

WPS Limit Login has a strong security track record. Known vulnerabilities have been patched promptly.

3 known CVEsLast CVE: Jul 23, 2019Updated 9mo ago
Risk Assessment

The wps-limit-login plugin v1.5.9.2 presents a mixed security posture. While the static analysis indicates a small attack surface with no immediate unprotected entry points and a reasonable number of capability and nonce checks for its AJAX handlers, several concerns arise from the code analysis and historical vulnerability data. The significant percentage of improperly escaped output (74%) is a major red flag, suggesting a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, all SQL queries lack prepared statements, which can lead to SQL injection vulnerabilities, especially when combined with potentially unsanitized input. The single taint flow with an unsanitized path, although not classified as critical or high, warrants attention as it could represent a localized security weakness. The plugin's history of three documented CVEs, including one critical and two high-severity vulnerabilities, particularly related to XSS, excessive authentication attempts, and CSRF, indicates a past struggle with robust security implementation. The last vulnerability being in 2019 also suggests potential stagnation in security updates. While the lack of critical taint flows in the current analysis and the presence of some security checks are positive, the high rate of unescaped output and the historical vulnerability pattern, coupled with raw SQL queries, indicate a substantial risk that needs careful consideration and mitigation.

Key Concerns

  • High percentage of unescaped output
  • All SQL queries lack prepared statements
  • Taint flow with unsanitized path
  • History of 1 critical CVE
  • History of 2 high CVEs
Vulnerabilities
3

WPS Limit Login Security Vulnerabilities

CVEs by Year

3 CVEs in 2019
2019
Patched Has unpatched

Severity Breakdown

Critical
1
High
2

3 total CVEs

WF-28dfc8c9-478c-48b2-8781-7e0787fd50fd-wps-limit-loginhigh · 7.2Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

WPS Limit Login < 1.4.6.1 - Stored Cross-Site Scripting

Jul 23, 2019 Patched in 1.4.6.1 (1645d)
WF-5e0ce0dc-34eb-4577-82a5-8ed822847ff4-wps-limit-logincritical · 9.8Improper Restriction of Excessive Authentication Attempts

WPS Limit Login < 1.4.6.1 - Authorization Bypass via IP Spoofing

Jul 23, 2019 Patched in 1.4.6.1 (1645d)
WF-b3f75424-b9f3-42ee-a96c-ff0ed30cbd2f-wps-limit-loginhigh · 8.8Cross-Site Request Forgery (CSRF)

WPS Limit Login < 1.4.6.1 - Cross-Site Request Forgery

Jul 23, 2019 Patched in 1.4.6.1 (1645d)
Code Analysis
Analyzed Mar 16, 2026

WPS Limit Login Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
46
16 escaped
Nonce Checks
4
Capability Checks
3
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries

Output Escaping

26% escaped62 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<whitelist> (blocks\whitelist.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WPS Limit Login Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_wps-limit-login-unlockclasses\plugin.php:111
authwp_ajax_wpslimitlogin_ratedclasses\plugin.php:133
WordPress Hooks 24
actionwp_login_failedclasses\plugin.php:78
filterwp_authenticate_userclasses\plugin.php:79
filtershake_error_codesclasses\plugin.php:81
actionlogin_headclasses\plugin.php:82
actionlogin_errorsclasses\plugin.php:83
actionnetwork_admin_menuclasses\plugin.php:86
actionadmin_menuclasses\plugin.php:90
filterxmlrpc_login_errorclasses\plugin.php:94
actionwp_headclasses\plugin.php:97
actionwp_authenticateclasses\plugin.php:104
actionauthenticateclasses\plugin.php:105
actioninitclasses\plugin.php:108
actionadmin_enqueue_scriptsclasses\plugin.php:113
filterwps_limit_login_whitelist_ipclasses\plugin.php:114
filterwps_limit_login_blacklist_ipclasses\plugin.php:115
actionlogin_formclasses\plugin.php:116
actionlogin_enqueue_scriptsclasses\plugin.php:117
actionadmin_initclasses\plugin.php:118
actionadmin_initclasses\plugin.php:120
actionwp_dashboard_setupclasses\plugin.php:129
filteradmin_footer_textclasses\plugin.php:131
filteradmin_footerclasses\plugin.php:132
filterwps_bidouille_not_display_pub_arrayclasses\plugin.php:134
actionplugins_loadedwps-limit-login.php:44
Maintenance & Trust

WPS Limit Login Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJun 24, 2025
PHP min version
Downloads932K

Community Trust

Rating98/100
Number of ratings83
Active installs100K
Developer Profile

WPS Limit Login Developer Profile

NicolasKulka

9 plugins · 149K total installs

76
trust score
Avg Security Score
95/100
Avg Patch Time
1444 days
View full developer profile
Detection Fingerprints

How We Detect WPS Limit Login

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wps-limit-login/assets/css/wps-limit-login.css/wp-content/plugins/wps-limit-login/assets/js/wps-limit-login.js
Script Paths
/wp-content/plugins/wps-limit-login/assets/js/wps-limit-login.js
Version Parameters
wps-limit-login/assets/css/wps-limit-login.css?ver=wps-limit-login/assets/js/wps-limit-login.js?ver=

HTML / DOM Fingerprints

CSS Classes
wps-limit-login-admin-notice
HTML Comments
<!-- WPS Limit Login --><!-- WPS Limit Login : DO NOT MODIFY THIS FILE -->
Data Attributes
data-wps-limit-login-options
JS Globals
wpsLimitLoginOptions
FAQ

Frequently Asked Questions about WPS Limit Login