[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fTpHnt8nFxKeyCRZ0bd9BOXHcrQ_TOnIa-87l38ATOQg":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":18,"download_link":24,"security_score":25,"vuln_count":26,"unpatched_count":27,"last_vuln_date":28,"fetched_at":29,"vulnerabilities":30,"developer":68,"crawl_stats":36,"alternatives":76,"analysis":178,"fingerprints":415},"wps-limit-login","WPS Limit Login","1.5.9.2","NicolasKulka","https:\u002F\u002Fprofiles.wordpress.org\u002Fnicolaskulka\u002F","\u003Ch4>Français\u003C\u002Fh4>\n\u003Cp>Limitez le nombre de tentatives de connexion possibles via la page de connexion et en utilisant les cookies auth.\u003Cbr \u002F>\nWordPress par défaut permet des tentatives de connexion illimitées soit via la page de connexion ou en envoyant des cookies spéciaux. Cela permet aux mots de passe (ou hashs) d’être craqués via la force brute relativement facilement.\u003Cbr \u002F>\nWPS Limit login limite les tentatives de connexion et bloque l’envoi d’autres tentatives à une adresse Internet après l’atteinte d’une limite spécifiée, ce qui rend une attaque par force brute difficile, voire impossible.\u003C\u002Fp>\n\u003Cp>Caractéristiques:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Limiter le nombre de nouvelles tentatives lors de la connexion (pour chaque IP). Ceci est entièrement personnalisable.\u003C\u002Fli>\n\u003Cli>Limitez le nombre de tentatives de connexion en utilisant des cookies d’autorisation de la même manière.\u003C\u002Fli>\n\u003Cli>Informe l’utilisateur sur les tentatives restantes ou le temps de verrouillage sur la page de connexion.\u003C\u002Fli>\n\u003Cli>Journalisation et notification par courriel facultative.\u003C\u002Fli>\n\u003Cli>Gère le serveur derrière le proxy inverse (reverse proxy).\u003C\u002Fli>\n\u003Cli>Il est possible de mettre en liste blanche \u002F liste noire les adresses IP.\u003C\u002Fli>\n\u003Cli>Compatibilité avec le pare-feu du site Web Sucuri.\u003C\u002Fli>\n\u003Cli>Protection de passerelle \u003Cstrong>XMLRPC\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Woocommerce\u003C\u002Fstrong> protection de la page de connexion.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Compatibilité multi-sites\u003C\u002Fstrong> avec des paramètres MU supplémentaires.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Pour en savoir plus lisez l’article suivant : \u003Ca href=\"https:\u002F\u002Fwpformation.com\u002Fwps-limit-login\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fwpformation.com\u002Fwps-limit-login\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Ce plugin vous est gentiment proposé par \u003Ca href=\"https:\u002F\u002Fwww.wpserveur.net\u002F?refwps=14&campaign=wpslimitlogin\" rel=\"nofollow ugc\">WPServeur\u003C\u002Fa> l’hébergeur spécialisé WordPress.\u003C\u002Fp>\n\u003Cp>Découvrez également nos autres extensions gratuites :\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Ffr.wordpress.org\u002Fplugins\u002Fwps-hide-login\u002F\" rel=\"nofollow ugc\">WPS Hide Login\u003C\u002Fa> pour changer votre URL de connexion en ce que vous voulez.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Ffr.wordpress.org\u002Fplugins\u002Fwps-bidouille\u002F\" rel=\"nofollow ugc\">WPS Bidouille\u003C\u002Fa> pour optimiser votre WordPress et faire le plein d’infos.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Ffr.wordpress.org\u002Fplugins\u002Fwps-cleaner\u002F\" rel=\"nofollow ugc\">WPS Cleaner\u003C\u002Fa> pour nettoyer votre site WordPress.\u003C\u002Fp>\n\u003Cp>Ce plugin est seulement maintenu, ce qui signifie que nous ne garantissons pas un support gratuit. Envisagez de signaler un problème et soyez patient.\u003C\u002Fp>\n\u003Ch4>English\u003C\u002Fh4>\n\u003Cp>Limit the number of login attempts that possible both through the normal login as well as using the auth cookies.\u003Cbr \u002F>\nWordPress by default allows unlimited login attempts either through the login page or by sending special cookies. This allows passwords (or hashes) to be cracked via brute-force relatively easily.\u003Cbr \u002F>\nWPS Limit login blocks an Internet address from making further attempts after a specified limit on retries has been reached, making a brute-force attack difficult or impossible.\u003C\u002Fp>\n\u003Cp>Features:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Limit the number of retry attempts when logging in (per each IP). This is fully customizable.\u003C\u002Fli>\n\u003Cli>Limit the number of attempts to log in using authorization cookies in the same way.\u003C\u002Fli>\n\u003Cli>Informs the user about the remaining retries or lockout time on the login page.\u003C\u002Fli>\n\u003Cli>Optional logging and optional email notification.\u003C\u002Fli>\n\u003Cli>Handles server behind the reverse proxy.\u003C\u002Fli>\n\u003Cli>It is possible to whitelist\u002Fblacklist IPs.\u003C\u002Fli>\n\u003Cli>Sucuri Website Firewall compatibility.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>XMLRPC\u003C\u002Fstrong> gateway protection.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Woocommerce\u003C\u002Fstrong> login page protection.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Multi-site\u003C\u002Fstrong> compatibility with extra MU settings.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>To learn more read the following article: \u003Ca href=\"https:\u002F\u002Fwpformation.com\u002Fwps-limit-login\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fwpformation.com\u002Fwps-limit-login\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>This plugin is kindly proposed by \u003Ca href=\"https:\u002F\u002Fwww.wpserveur.net\u002F?refwps=14&campaign=wpslimitlogin\" rel=\"nofollow ugc\">WPServeur\u003C\u002Fa> the specialized WordPress web host.\u003C\u002Fp>\n\u003Cp>Découvrez également nos autres extensions gratuites :\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwps-hide-login\u002F\" rel=\"ugc\">WPS Hide Login\u003C\u002Fa> to change your login URL to whatever you want.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwps-bidouille\u002F\" rel=\"ugc\">WPS Bidouille\u003C\u002Fa> to optimize your WordPress and get more info.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwps-cleaner\u002F\" rel=\"ugc\">WPS Cleaner\u003C\u002Fa> to clean your WordPress site.\u003C\u002Fp>\n\u003Cp>This plugin is only maintained, which means we do not guarantee free support. Consider reporting a problem and be patient.\u003C\u002Fp>\n","WPS Limit login limit connection attempts by IP address",100000,931525,98,83,"2025-06-24T07:45:00.000Z","6.8.5","4.2","",[20,21,22,23,4],"authentication","limit-login","login","security","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwps-limit-login.1.5.9.2.zip",96,3,0,"2019-07-23 00:00:00","2026-03-15T15:16:48.613Z",[31,47,58],{"id":32,"url_slug":33,"title":34,"description":35,"plugin_slug":4,"theme_slug":36,"affected_versions":37,"patched_in_version":38,"severity":39,"cvss_score":40,"cvss_vector":41,"vuln_type":42,"published_date":28,"updated_date":43,"references":44,"days_to_patch":46},"WF-28dfc8c9-478c-48b2-8781-7e0787fd50fd-wps-limit-login","wps-limit-login-stored-cross-site-scripting","WPS Limit Login \u003C 1.4.6.1 - Stored Cross-Site Scripting","The WPS Limit Login plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the IP address value that can be spoofed in versions up to, and including, 1.4.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",null,"\u003C1.4.6.1","1.4.6.1","high",7.2,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:C\u002FC:L\u002FI:L\u002FA:N","Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","2024-01-22 19:56:02",[45],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F28dfc8c9-478c-48b2-8781-7e0787fd50fd?source=api-prod",1645,{"id":48,"url_slug":49,"title":50,"description":51,"plugin_slug":4,"theme_slug":36,"affected_versions":37,"patched_in_version":38,"severity":52,"cvss_score":53,"cvss_vector":54,"vuln_type":55,"published_date":28,"updated_date":43,"references":56,"days_to_patch":46},"WF-5e0ce0dc-34eb-4577-82a5-8ed822847ff4-wps-limit-login","wps-limit-login-authorization-bypass-via-ip-spoofing","WPS Limit Login \u003C 1.4.6.1 - Authorization Bypass via IP Spoofing","The WPS Limit Login plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.4.6. This is due to flawed implementation of the get_address() method. This makes it possible for unauthenticated attackers  to run automated scripts to brute force passwords by changing the supplied IP Address in the HTTP header of the request. .","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Restriction of Excessive Authentication Attempts",[57],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F5e0ce0dc-34eb-4577-82a5-8ed822847ff4?source=api-prod",{"id":59,"url_slug":60,"title":61,"description":62,"plugin_slug":4,"theme_slug":36,"affected_versions":37,"patched_in_version":38,"severity":39,"cvss_score":63,"cvss_vector":64,"vuln_type":65,"published_date":28,"updated_date":43,"references":66,"days_to_patch":46},"WF-b3f75424-b9f3-42ee-a96c-ff0ed30cbd2f-wps-limit-login","wps-limit-login-cross-site-request-forgery","WPS Limit Login \u003C 1.4.6.1 - Cross-Site Request Forgery","The WPS Limit Login plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.4.6. This is due to missing nonce validation on the wpslimitlogin_rated AJAX action. This makes it possible for unauthenticated attackers to perform administrative actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Cross-Site Request Forgery (CSRF)",[67],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fb3f75424-b9f3-42ee-a96c-ff0ed30cbd2f?source=api-prod",{"slug":69,"display_name":7,"profile_url":8,"plugin_count":70,"total_installs":71,"avg_security_score":72,"avg_patch_time_days":73,"trust_score":74,"computed_at":75},"nicolaskulka",9,149090,95,1444,76,"2026-04-03T21:30:57.252Z",[77,101,119,136,159],{"slug":78,"name":79,"version":80,"author":81,"author_profile":82,"description":83,"short_description":84,"active_installs":85,"downloaded":86,"rating":87,"num_ratings":88,"last_updated":89,"tested_up_to":90,"requires_at_least":91,"requires_php":92,"tags":93,"homepage":98,"download_link":99,"security_score":13,"vuln_count":26,"unpatched_count":27,"last_vuln_date":100,"fetched_at":29},"anti-spam","Titan Anti-spam & Security","7.5.0","Themeisle","https:\u002F\u002Fprofiles.wordpress.org\u002Fthemeisle\u002F","\u003Cp>Titan Anti-Spam & Security is a complete protection solution designed to secure your website against spam, login attacks, and unauthorized access.\u003C\u002Fp>\n\u003Cp>Websites are constantly targeted by automated spam bots, brute force login attempts, and malicious access patterns. Titan helps you block spam comments, protect your login page, enforce strong authentication, and apply essential security hardening rules from a single dashboard.\u003C\u002Fp>\n\u003Cp>Whether you run a blog, business site, WooCommerce store, membership platform, or agency network, Titan helps you:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Stop comment spam automatically\u003C\u002Fli>\n\u003Cli>Protect your login area from brute force attacks\u003C\u002Fli>\n\u003Cli>Limit login attempts and lock suspicious activity\u003C\u002Fli>\n\u003Cli>Monitor login activity and security events\u003C\u002Fli>\n\u003Cli>Apply security hardening best practices\u003C\u002Fli>\n\u003Cli>Enable two-factor authentication for stronger account security in \u003Ca href=\"https:\u002F\u002Ftitansitescanner.com\u002F?utm_source=wordpressorg&utm_medium=readme&utm_campaign=2fa\" rel=\"nofollow ugc\">Pro\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>Create backups with advanced storage options in \u003Ca href=\"https:\u002F\u002Ftitansitescanner.com\u002F?utm_source=wordpressorg&utm_medium=readme&utm_campaign=backup\" rel=\"nofollow ugc\">Pro\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Titan is designed to reduce risk without affecting legitimate visitors or requiring captcha challenges.\u003C\u002Fp>\n\u003Ch3>Quick links\u003C\u002Fh3>\n\u003Cp>📘 \u003Ca href=\"https:\u002F\u002Fdocs.themeisle.com\u002Ftitan-anti-spam-security\u002F\" rel=\"nofollow ugc\">Documentation\u003C\u002Fa> – Complete setup and configuration guide\u003Cbr \u002F>\n💬 \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fanti-spam\u002F\" rel=\"ugc\">Support Forum\u003C\u002Fa> – Get help with spam protection, login security, and plugin settings from the community and support team.\u003Cbr \u002F>\n⭐ \u003Ca href=\"https:\u002F\u002Ftitansitescanner.com\u002F?utm_source=wordpressorg&utm_medium=readme&utm_campaign=quicklinks\" rel=\"nofollow ugc\">Go Pro\u003C\u002Fa> – Unlock Machine Learning spam detection, two-factor authentication, backups, and priority support.\u003C\u002Fp>\n\u003Ch3>Anti Spam Protection\u003C\u002Fh3>\n\u003Cp>Spam comments can damage your SEO, clutter your database, and waste moderation time. Titan provides automated spam protection that works in the background without interrupting real users.\u003C\u002Fp>\n\u003Cp>Every comment is checked against a global spam database and evaluated using intelligent filtering rules. Suspicious comments are automatically marked as spam and hidden from public view.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Automatic spam comment blocking:\u003C\u002Fstrong> Blocks spam comments in real time using a global spam database and intelligent filtering rules. Suspicious submissions are automatically marked as spam before they appear publicly.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Block spam comments without captcha:\u003C\u002Fstrong> Protect your site from comment spam without forcing visitors to solve captcha challenges. Real users experience a smooth commenting process.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Save spam comments for review:\u003C\u002Fstrong> Optionally store filtered spam comments in the moderation area so you can verify filtering accuracy and review blocked content.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Detailed spam processing logs:\u003C\u002Fstrong> View logs of processed comments to understand how spam filtering works and monitor spam activity trends.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Privacy policy link integration:\u003C\u002Fstrong> Display a privacy policy notice under comment forms to help with transparency and compliance requirements.\u003C\u002Fp>\n\u003Cp>This ensures real visitors can interact freely while bots are filtered automatically.\u003C\u002Fp>\n\u003Ch3>Security Hardening Tools\u003C\u002Fh3>\n\u003Cp>Titan includes built-in security hardening options that reduce publicly exposed information and protect your website from common automated attacks.\u003C\u002Fp>\n\u003Cp>Many bots scan websites looking for version numbers, exposed login patterns, weak passwords, or XML-RPC endpoints. Titan helps minimize those risks with configurable hardening controls that strengthen overall site security.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Strong Password Enforcement:\u003C\u002Fstrong> Force users to create strong passwords based on the WordPress password strength meter. Weak passwords are a leading cause of account compromise. Enforcing strong credentials significantly improves login security and reduces unauthorized** access risks.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Hide Author Login:\u003C\u002Fstrong> Attackers can attempt to discover usernames using author archive URLs. Titan prevents user enumeration by restricting access patterns that reveal valid login names. This reduces the effectiveness of targeted brute force login attacks.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Disable XML-RPC:\u003C\u002Fstrong> XML-RPC can be abused for automated login attacks and pingback spam. Disabling XML-RPC reduces exposure to remote brute force attempts and limits unnecessary resource usage.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Hide Version Information:\u003C\u002Fstrong> WordPress core and plugins sometimes expose version numbers in the source code. Attackers use this information to target known vulnerabilities. Titan removes version references to reduce fingerprinting risks.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Remove Version Query Strings:\u003C\u002Fstrong> JavaScript and CSS files often include version query parameters. Removing these prevents attackers from identifying the exact WordPress or plugin version running on your site.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Remove Meta Generator Tag:\u003C\u002Fstrong> The generator meta tag can reveal your CMS version. Titan removes it to reduce publicly visible system information and lower exposure.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Remove HTML Comments:\u003C\u002Fstrong> Some themes and plugins output HTML comments that may expose structural details. Titan can remove these comments to limit unnecessary information disclosure.\u003C\u002Fp>\n\u003Cp>Together, these security hardening options reduce your attack surface and strengthen your website without affecting normal functionality.\u003C\u002Fp>\n\u003Ch3>Activity Monitoring and Logs\u003C\u002Fh3>\n\u003Cp>Security is not only about blocking attacks. It is also about visibility and awareness.\u003C\u002Fp>\n\u003Cp>Titan includes built-in monitoring tools that help you understand login behavior and security activity on your website.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Login Attempts Log:\u003C\u002Fstrong> Track failed login attempts in real time. See which IP addresses are attempting access, how many retries were made, and when lockouts were triggered. This helps you evaluate brute force protection effectiveness.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Activity Logger:\u003C\u002Fstrong> Monitor security-related events across your site, including login activity and system actions. Identify suspicious patterns before they escalate.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Error Log Viewer:\u003C\u002Fstrong> View plugin-related errors directly from the dashboard. Diagnose configuration issues quickly without accessing server files.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Debug Information Export:\u003C\u002Fstrong> Export diagnostic information when contacting support. This reduces troubleshooting time and speeds up issue resolution.\u003C\u002Fp>\n\u003Cp>With proper monitoring and logging, you are not only blocking attacks but also gaining insight into how your website is being targeted.\u003C\u002Fp>\n\u003Ch3>PRO Anti Spam Features\u003C\u002Fh3>\n\u003Cp>\u003Cstrong>Machine Learning spam detection:\u003C\u002Fstrong> Advanced spam filtering powered by Machine Learning improves detection accuracy by analyzing behavioral patterns across large datasets.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Scan existing comments for spam:\u003C\u002Fstrong> Identify previously approved spam comments and clean up your database.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Scan registered users for spam accounts:\u003C\u002Fstrong> Detect and flag suspicious user accounts that may have been created by spam bots.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Enhanced background spam analysis:\u003C\u002Fstrong> Apply additional invisible tests that improve spam protection without affecting legitimate visitors.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Ftitansitescanner.com\u002F?utm_source=wordpressorg&utm_medium=readme&utm_campaign=antispam\" rel=\"nofollow ugc\">Upgrade to unlock\u003C\u002Fa> advanced anti-spam capabilities.\u003C\u002Fp>\n\u003Ch3>PRO Two Factor Authentication\u003C\u002Fh3>\n\u003Cp>Two-factor authentication adds an additional verification step beyond a password. Even if a password is compromised, attackers cannot access the account without the second authentication factor.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>QR Code Setup:\u003C\u002Fstrong> Scan a QR code with an authenticator app to activate two-factor authentication quickly and securely.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Manual Secret Key Configuration:\u003C\u002Fstrong> Set up two-factor authentication manually if QR code scanning is unavailable.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Per User 2FA Management:\u003C\u002Fstrong> Enable or manage two-factor authentication individually for specific users or roles.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Compatible with TOTP Apps:\u003C\u002Fstrong> Works with popular authenticator apps such as Google Authenticator and other TOTP-compatible applications.\u003C\u002Fp>\n\u003Cp>Two-factor authentication significantly strengthens login security for administrators and users.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Ftitansitescanner.com\u002F?utm_source=wordpressorg&utm_medium=readme&utm_campaign=2fa\" rel=\"nofollow ugc\">Upgrade to Titan Pro\u003C\u002Fa> to enable Two Factor Authentication and advanced account protection.\u003C\u002Fp>\n\u003Ch3>PRO Backup and Recovery\u003C\u002Fh3>\n\u003Cp>Regular backups are essential for website security and recovery planning. If something goes wrong, having a recent backup allows you to restore your site quickly.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Scheduled Automatic Backups:\u003C\u002Fstrong> Automatically create backups at defined intervals to ensure recent recovery points are always available.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Manual Backup Creation:\u003C\u002Fstrong> Generate a backup instantly before making major changes to your website.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>FTP Storage Support:\u003C\u002Fstrong> Store backups on a remote FTP server for additional protection and redundancy.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Dropbox Storage Integration:\u003C\u002Fstrong> Save backups to Dropbox for secure off-site storage.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Automatic Archive Cleanup:\u003C\u002Fstrong> Remove older backup files automatically to manage storage usage efficiently.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Adjustable Backup Performance:\u003C\u002Fstrong> Control backup speed to balance performance and server resource usage.\u003C\u002Fp>\n\u003Cp>Backups can be managed directly from the Titan dashboard for centralized control.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Ftitansitescanner.com\u002F?utm_source=wordpressorg&utm_medium=readme&utm_campaign=backup\" rel=\"nofollow ugc\">Upgrade to Titan Pro\u003C\u002Fa> to unlock scheduled backups and external storage options.\u003C\u002Fp>\n\u003Ch3>Use Cases\u003C\u002Fh3>\n\u003Cp>Titan is suitable for:\u003C\u002Fp>\n\u003Cp>• Blogs receiving large volumes of comment spam\u003Cbr \u002F>\n• WooCommerce stores protecting customer login pages\u003Cbr \u002F>\n• Membership websites securing user accounts\u003Cbr \u002F>\n• Agencies managing multiple client websites\u003Cbr \u002F>\n• Educational platforms enforcing stronger authentication\u003Cbr \u002F>\n• Website owners looking for anti-spam and login security in one plugin\u003C\u002Fp>\n\u003Ch3>Support\u003C\u002Fh3>\n\u003Cp>Need help? Open a new thread in the \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fanti-spam\u002F\" rel=\"ugc\">Support Forum\u003C\u002Fa>, and we’ll be happy to assist.\u003C\u002Fp>\n\u003Ch3>Documentation\u003C\u002Fh3>\n\u003Cp>Discover how to make the most of Robin with our detailed and user-friendly \u003Ca href=\"https:\u002F\u002Fdocs.themeisle.com\u002F\" rel=\"nofollow ugc\">documentation\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>Titan is backed by Themeisle, trusted by over 1 million WordPress users worldwide.\u003C\u002Fp>\n","Block spam comments, defend against login attempts, and strengthen site security with anti-spam, brute-force protection, and two-factor authentication &hellip;",60000,3435619,90,368,"2026-03-11T17:54:00.000Z","6.9.4","5.6","7.4",[94,95,96,23,97],"antispam","brute-force-protection","limit-login-attempts","two-factor-authentication","http:\u002F\u002Fwordpress.org\u002Fplugins\u002Fanti-spam\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fanti-spam.7.5.0.zip","2024-07-11 00:00:00",{"slug":102,"name":103,"version":104,"author":105,"author_profile":106,"description":107,"short_description":108,"active_installs":109,"downloaded":110,"rating":27,"num_ratings":27,"last_updated":111,"tested_up_to":90,"requires_at_least":112,"requires_php":92,"tags":113,"homepage":116,"download_link":117,"security_score":118,"vuln_count":27,"unpatched_count":27,"last_vuln_date":36,"fetched_at":29},"ghostgate","GhostGate","1.3.3","codegee0958","https:\u002F\u002Fprofiles.wordpress.org\u002Fcodegee0958\u002F","\u003Cp>\u003Cstrong>GhostGate\u003C\u002Fstrong> is a lightweight yet powerful WordPress security plugin that eliminates the login page as an attack surface. Instead of just defending, it \u003Cstrong>erases the entrance\u003C\u002Fstrong> entirely with dynamic login URLs and multi-layer access verification.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>🔒 Hide your login URL with a custom slug and time-based code\u003C\u002Fli>\n\u003Cli>🔑 Built-in 2FA via email verification\u003C\u002Fli>\n\u003Cli>🚫 Auto-block brute force attacks by IP\u003C\u002Fli>\n\u003Cli>🧱 Disable\u002Flimit unused endpoints like XML-RPC and REST API\u003C\u002Fli>\n\u003Cli>👤 Prevent user enumeration via REST, RSS, and author queries\u003C\u002Fli>\n\u003Cli>🔍 Visualize security status and detect conflicts\u003C\u002Fli>\n\u003Cli>📜 Activity logs with optional file rotation\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>GhostGate doesn’t just defend — it disappears.\u003Cbr \u002F>\nInvisible to bots. Intuitive for users.\u003C\u002Fp>\n\u003Cp>👉 \u003Cstrong>Full features \u002F screenshots \u002F pricing \u002F docs\u003C\u002Fstrong>:\u003Cbr \u002F>\nhttps:\u002F\u002Farce-experience.com\u002Fproduct\u002F\u003C\u002Fp>\n\u003Ch3>Privacy\u003C\u002Fh3>\n\u003Cp>GhostGate can store the following data locally on your site to provide rate-limiting and security auditing:\u003Cbr \u002F>\n– IP addresses (for temporary throttling \u002F block lists)\u003Cbr \u002F>\n– Timestamps and event metadata (login attempts, REST\u002FXML-RPC hits)\u003Cbr \u002F>\n– Optional log files under \u003Ccode>wp-content\u002Fuploads\u002Fghostgate\u002Flogs\u003C\u002Fcode> (if enabled)\u003C\u002Fp>\n\u003Cp>No data is sent to third-party services.\u003Cbr \u002F>\nSite owners are responsible for informing users\u002Fvisitors where required by local laws. You can clear blocks\u002Flogs from the admin UI or by deleting the log files.\u003C\u002Fp>\n","Invisible, intelligent protection for WordPress. GhostGate hides your login page, blocks bots, and turns your site into a ghost fortress.",10,405,"2026-01-21T00:06:00.000Z","5.8",[96,114,23,97,115],"rest-api","xml-rpc","https:\u002F\u002Farce-experience.com\u002Fproduct\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fghostgate.1.3.3.zip",100,{"slug":120,"name":121,"version":122,"author":123,"author_profile":124,"description":125,"short_description":126,"active_installs":109,"downloaded":127,"rating":27,"num_ratings":27,"last_updated":128,"tested_up_to":129,"requires_at_least":130,"requires_php":18,"tags":131,"homepage":133,"download_link":134,"security_score":135,"vuln_count":27,"unpatched_count":27,"last_vuln_date":36,"fetched_at":29},"orbisius-limit-logins","Orbisius Limit Logins","1.0.0","Svetoslav Marinov","https:\u002F\u002Fprofiles.wordpress.org\u002Flordspace\u002F","\u003Cp>This plugin logs and blocks IP address of users who try to login with known bad usernames such as admin, adm etc.\u003Cbr \u002F>\nThe plugin intentionally hooks very early (plugins_loaded hook) in order to determine if the user should be blocked or not because that way WordPress doesn’t have to waste resources if the user is supposed to be blocked.\u003Cbr \u002F>\nIt stores the IP address in the uploads folder (.htaccess protected) so it doesn’t hit the database for the ip checks. This may not work on some setups.\u003C\u002Fp>\n\u003Cp>The user will get blocked in these cases:\u003Cbr \u002F>\n– Tries to login using one of the bad usernames (admin, adm, root, administrator)\u003Cbr \u002F>\n– Tries 7 or more ties to guess any password of any user\u003C\u002Fp>\n\u003Cp>Note: If you still have an account whose username matches the logins mentioned above please create a new admin account and use that one instead\u003Cbr \u002F>\n..  or \u003Cem>you will get banned\u003C\u002Fem> when you attempt to login regardless if your password was valid or not.\u003C\u002Fp>\n\u003Cp>When the user should be blocked the plugin outputs Internal Server Error message and stop. That way the attacked doesn’t know what’s happening.\u003Cbr \u002F>\nAlso the user is has to wait between 3 and 15 seconds before seeing this error message to slow him\u002Fher down.\u003C\u002Fp>\n\u003Ch4>Features \u002F Benefits\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Hooks very early and checks if the user is blocked -> blocks to saves resources\u003C\u002Fli>\n\u003Cli>Doesn’t block server’s ip or localhost \u002F 127.0.0.1\u003C\u002Fli>\n\u003Cli>The plugin should be capable of detecting multiple IP address of a visitor (some proxies pass the original IP address via different request variable)\u003C\u002Fli>\n\u003Cli>If an IP is blocked that user is not allowed to access the whole site not just the login page.\u003C\u002Fli>\n\u003Cli>Extensible via hooks (filters, actions).\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Demo\u003C\u002Fh3>\n\u003Cp>TODO\u003C\u002Fp>\n\u003Cp>Bugs? Suggestions? If you want a faster response contact us through our website’s contact form [ orbisius.com ] and not through the support tab of this plugin or WordPress forums.\u003Cbr \u002F>\nWe don’t get notified when such requests get posted in the forums.\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>Support is handled on our site: \u003Ca href=\"http:\u002F\u002Fclub.orbisius.com\u002Fforums\u002F\" title=\"[new window]\" rel=\"nofollow ugc\">http:\u002F\u002Fclub.orbisius.com\u002Fforums\u002F\u003C\u002Fa>\u003Cbr \u002F>\n  Please do NOT use the WordPress forums or other places to seek support.\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Ch4>Author\u003C\u002Fh4>\n\u003Cp>Svetoslav Marinov (Slavi) | \u003Ca href=\"http:\u002F\u002Forbisius.com\" title=\"Custom Web Programming, Web Design, e-commerce, e-store, WordPress Plugin Development, Facebook and Mobile App Development in Niagara Falls, St. Catharines, Ontario, Canada\" rel=\"nofollow ugc\">Custom Web and Mobile Programming by Orbisius.com\u003C\u002Fa>\u003C\u002Fp>\n","Protect your site from automated logins efficiently!",3141,"2014-12-18T22:10:00.000Z","4.1.42","2.6",[20,96,132,22,23],"limit-logins","http:\u002F\u002Fclub.orbisius.com\u002Fproducts\u002Fwordpress-plugins\u002Forbisius-limit-logins\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Forbisius-limit-logins.1.0.0.zip",85,{"slug":137,"name":138,"version":139,"author":140,"author_profile":141,"description":142,"short_description":143,"active_installs":144,"downloaded":145,"rating":146,"num_ratings":147,"last_updated":148,"tested_up_to":90,"requires_at_least":149,"requires_php":91,"tags":150,"homepage":154,"download_link":155,"security_score":156,"vuln_count":157,"unpatched_count":27,"last_vuln_date":158,"fetched_at":29},"all-in-one-wp-security-and-firewall","All-In-One Security (AIOS) – Security and Firewall","5.4.6","David Anderson \u002F Team Updraft","https:\u002F\u002Fprofiles.wordpress.org\u002Fdavidanderson\u002F","\u003Ch3>THE TOP RATED WORDPRESS SECURITY AND FIREWALL PLUGIN\u003C\u002Fh3>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security?utm_source=aios-wp-dir&utm_medium=referral&utm_campaign=plugin-dir&utm_content=aios&utm_creative_format=description\" rel=\"nofollow ugc\">All-in-One Security (AIOS)\u003C\u002Fa> is a WordPress security plugin from the same, trusted team that brought you UpdraftPlus.\u003C\u002Fp>\n\u003Cp>It’s called ‘All-In-One’ because it’s packed full of ways to keep your WordPress website(s) safe and secure.\u003C\u002Fp>\n\u003Cp>It includes:\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Login security features\u003C\u002Fstrong> keep bots at bay. Lock out users based on a configurable number of login attempts, get two-factor authentication and more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>File and database security.\u003C\u002Fstrong> Get notified of file changes that occur outside of normal operations. Block access to key files and scan files and folders to spot insecure permissions.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Firewall.\u003C\u002Fstrong> Get PHP, .htaccess and 6G firewall rules courtesy of Perishable Press. Spot and block fake Google Bots and more!\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Spam prevention.\u003C\u002Fstrong> Prevent annoying spam comments and reduce unnecessary load on the server. Automatically and permanently block IP addresses that exceed a set number of spam comments.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Audit log.\u003C\u002Fstrong> View events happening on your WordPress website. Find out if a plugin or theme has been added, removed, updated and more.\u003C\u002Fp>\n\u003Ch4>WHY ALL-IN-ONE SECURITY?\u003C\u002Fh4>\n\u003Cp>AIOS has a near-perfect \u003Cstrong>4.7 \u002F 5-star user rating\u003C\u002Fstrong> across more than 1 million installs.\u003C\u002Fp>\n\u003Cp>Great for beginners and experts alike. AIOS guides you logically and clearly through each of its features which are all clearly explained. Security features are marked as basic, intermediate and advanced. Each step increases your security score. Turn them on and watch your protection grow!\u003C\u002Fp>\n\u003Cp>We have a large support team of software developers. That means we have the availability and the skillset to help you with the trickiest of queries.\u003C\u002Fp>\n\u003Cp>We comb the WordPress plugin directory for support tickets daily – most queries are responded to within 24 hours.\u003C\u002Fp>\n\u003Cp>\u003Cem>Excellent plugin with numerous well-thought-out options for making a website more secure. I have been using it for years and am very happy with it. I recently had a small problem setting up a website and – even as a non-premium user – I received support very quickly. Highly recommended!\u003C\u002Fem>\u003C\u002Fp>\n\u003Cp>For even more ways to stay safe and secure, upgrade to \u003Ca href=\"https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u002Fpricing?utm_source=aios-wp-dir&utm_medium=referral&utm_campaign=plugin-dir&utm_content=aios_premium&utm_creative_format=description\" rel=\"nofollow ugc\">AIOS Premium\u003C\u002Fa> – it packs a punch security-wise, whilst being \u003Cstrong>extremely cost-competitive\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Ch4>LOGIN SECURITY\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Two-factor authentication (TFA)\u003C\u002Fstrong> – Require TFA for specific user roles. Supports Google Authenticator, Microsoft Authenticator, Authy, and many more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Detect and manage ‘admin’ usernames\u003C\u002Fstrong> – Identify default ‘admin’ usernames and guide users to change them to protect against brute force attacks.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Identify and correct identical login and display names\u003C\u002Fstrong> – Detect cases where the display name matches the username and provide guidance to improve login security.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Prevent user enumeration\u003C\u002Fstrong> – Block unauthorised access to URLs that can reveal sensitive information such as usernames or other details.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Control login attempts\u003C\u002Fstrong> – Prevent brute force attacks by limiting the number of failed login attempts. Choose how many login attempts are allowed, set lockout durations, and more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Force user logout\u003C\u002Fstrong> – Automatically log out users after a specified period of time. Unattended sessions are closed, reducing the risk of unauthorised access.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Manually approve new registrations\u003C\u002Fstrong> – Review and approve new user registrations to prevent spam and fake sign-ups.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Enhance WordPress salt security\u003C\u002Fstrong> – Adds 64 extra characters to WordPress salts, rotating them weekly. Makes cracking passwords virtually impossible, even if your database is stolen.\u003C\u002Fp>\n\u003Ch4>Plugin Support\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>If you have a question or problem with the All-In-One Security plugin, post it on the support forum and we will help you. Premium customers can log queries directly with the team via https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u002F\u003Cbr \u002F>\n\u003Cstrong>Monitor and manage active sessions\u003C\u002Fstrong> – If a user is logged in who shouldn’t be, log them out or add them to a blacklist.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>SPAM PREVENTION\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block spam coming from bots\u003C\u002Fstrong> – Reduce the load on your server and improve the user experience by automatically blocking spam comments from bots.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Monitor spam IP addresses\u003C\u002Fstrong> – Monitor the IP addresses of people or bots leaving spam comments. Choose which ones to block based on a configurable number of comments left.\u003C\u002Fp>\n\u003Ch4>FILE \u002F DATABASE Security\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Scan and fix file permissions\u003C\u002Fstrong> – Scan for insecure file permissions. Click once to fix issues and safeguard critical files and folders.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Disable PHP file editing\u003C\u002Fstrong> – Disable editing of PHP files (such as plugins and themes) via the dashboard. It’s often the first tool that attackers use as it allows for code execution.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Protect sensitive files\u003C\u002Fstrong> – Prevent access to files like readme.html that might reveal information about your WordPress installation.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>File change scanner\u003C\u002Fstrong> – Get notified of any file changes which occur on your system. Exclude files and folders which change as part of normal operations.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Prevent image hotlinking\u003C\u002Fstrong> – Prevent other websites from displaying your images via hotlinking and protect server bandwidth.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Secure database backups\u003C\u002Fstrong> – Perform a database backup via UpdraftPlus from AIOS. Change the default ‘wp_’ prefix to hide your WordPress database from hackers.\u003C\u002Fp>\n\u003Ch4>FIREWALL\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Get .htaccess firewall rules\u003C\u002Fstrong> – Deny access to the .htaccess and wp-config.php files. Disable the server signature and limit file uploads to a configurable size.**\u003C\u002Fp>\n\u003Cp>Block access to the debug.log file and prevent Apache servers from listing the contents of a directory when an index.php file is not present\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Get PHP firewall rules\u003C\u002Fstrong> – PHP firewall rules prevent malicious users from exploiting well-known vulnerabilities in XML-RPC. Safeguard your content by disabling RSS and Atom feeds and avoid cross-site scripting (XSS) attacks.\u003Cbr \u002F>\nBlock fake Google bots and POST requests made by bots – Block fake Google bots and stop bots from making POST requests by blocking IP addresses where the user-agent and referrer fields are blank.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Utilise 6G firewall rules\u003C\u002Fstrong> – Employ flexible blacklist rules to reduce the number of malicious URL requests that hit your website (courtesy of Perishable Press).\u003C\u002Fp>\n\u003Cp>\u003Cstrong>And more\u003C\u002Fstrong> – Blacklist (and whitelist) IP ranges and user agents and block unauthorized access to data by disabling REST API access for non-logged-in requests.\u003C\u002Fp>\n\u003Ch4>TWO-FACTOR AUTHENTICATION ENHANCED [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Two-factor authentication\u003C\u002Fstrong> is included in the free plugin. Upgrade to Premium if you’d like to:\u003Cbr \u002F>\nRequire TFA after a set time period – Mandate TFA for all admins or other roles after their accounts reach a specified age.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Control how often TFA is required\u003C\u002Fstrong> – Set TFA to be required after a certain number of days on trusted devices instead of every login.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Customise design layout\u003C\u002Fstrong> – Adjust the TFA design to match your website’s existing layout and branding.\u003Cbr \u002F>\nEmergency codes – Generate one-time use emergency codes to regain access if you lose your TFA device.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>WordPress Multisite Compatible\u003C\u002Fstrong> – Ensure compatibility with WordPress multisite networks and their sub-sites for consistent TFA application.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Integration with login forms\u003C\u002Fstrong> – Integrate TFA with various login forms, including WooCommerce, Affiliates-WP, Elementor Pro, bbPress, and ‘Theme My Login’ without additional coding.\u003C\u002Fp>\n\u003Ch4>SMART 404 BLOCKING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block IPs based on 404 errors\u003C\u002Fstrong> – Detect hackers probing your URLs via script and bots by the 404 errors they leave behind.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 Configuration\u003C\u002Fstrong> – Set a figure for the maximum number of 404 events allowed before an IP address is blocked. Choose a time period within which the 404 events must occur (e.g., 10 errors within 10 minutes).\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 block by URL string\u003C\u002Fstrong> – Instantly block an IP address if a 404 event includes a specific URL string.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 whitelisting\u003C\u002Fstrong> – Prevent particular IP addresses from being permanently blocked due to 404 events.\u003C\u002Fp>\n\u003Ch4>COUNTRY BLOCKING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block traffic to the entire site or to specific pages or posts\u003C\u002Fstrong> – Useful if you’re an e-commerce site and you want to block sales to some countries for shipping or tax reasons.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Whitelist some users from blocked countries\u003C\u002Fstrong> – Whitelist IP addresses or IP ranges even if they are part of a blocked country.\u003C\u002Fp>\n\u003Ch4>MALWARE SCANNING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Automatic malware scanning\u003C\u002Fstrong> – Detect and protect against the latest malware, trojans, and spyware.\u003Cbr \u002F>\nAlerts you to blacklisting by search engines – Monitor your site for blacklisting by search engines due to malicious code.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Response time monitoring\u003C\u002Fstrong> – Keep track of your website’s response time to identify and address any performance issues.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Uptime monitoring\u003C\u002Fstrong> – Checks your website’s uptime every 5 minutes and alerts you immediately if your site or server goes down.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Advice and malware removal\u003C\u002Fstrong> – Need hands-on advice and support for malware removal? Our team of genuine cybersecurity experts is here to help.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Notification if something’s amiss\u003C\u002Fstrong> – Receive notifications about any issues with your site so you can address problems before they escalate.\u003C\u002Fp>\n\u003Ch4>Plugin Support\u003C\u002Fh4>\n\u003Cp>If you have a question or problem with the All-In-One Security plugin, post it on the support forum and we will help you. Premium customers can log queries directly with the team via https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u003C\u002Fp>\n\u003Ch4>Developers\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>If you are a developer and you need some extra hooks or filters for this plugin then let us know.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Translations\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>All-In-One Security plugin can be translated to any language.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Currently available translations:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>English\u003C\u002Fli>\n\u003Cli>German\u003C\u002Fli>\n\u003Cli>Spanish\u003C\u002Fli>\n\u003Cli>French\u003C\u002Fli>\n\u003Cli>Hungarian\u003C\u002Fli>\n\u003Cli>Italian\u003C\u002Fli>\n\u003Cli>Swedish\u003C\u002Fli>\n\u003Cli>Russian\u003C\u002Fli>\n\u003Cli>Chinese\u003C\u002Fli>\n\u003Cli>Portuguese (Brazil)\u003C\u002Fli>\n\u003Cli>Persian\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Privacy Policy\u003C\u002Fh4>\n\u003Cp>This plugin may collect IP addresses for security reasons such as mitigating brute force login threats and malicious activity.\u003C\u002Fp>\n\u003Cp>The collected information is stored on your server. No information is transmitted to third parties or remote server locations.\u003C\u002Fp>\n\u003Ch4>Usage\u003C\u002Fh4>\n\u003Cp>Go to the settings menu after you activate the plugin and follow the instructions.\u003C\u002Fp>\n\u003Ch3>Usage\u003C\u002Fh3>\n\u003Cp>Go to the settings menu after you activate the plugin and follow the instructions.\u003C\u002Fp>\n","Protect your website investment with All-In-One Security (AIOS) – a comprehensive and easy to use security plugin designed especially for WordPress.",1000000,36139406,94,1693,"2026-01-28T22:15:00.000Z","5.0",[151,152,153,23,97],"firewall","login-security","malware-scanning","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fall-in-one-wp-security-and-firewall\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fall-in-one-wp-security-and-firewall.5.4.6.zip",93,26,"2024-02-08 00:00:00",{"slug":96,"name":160,"version":161,"author":162,"author_profile":163,"description":164,"short_description":165,"active_installs":166,"downloaded":167,"rating":168,"num_ratings":169,"last_updated":170,"tested_up_to":171,"requires_at_least":172,"requires_php":18,"tags":173,"homepage":174,"download_link":175,"security_score":176,"vuln_count":26,"unpatched_count":27,"last_vuln_date":177,"fetched_at":29},"Limit Login Attempts","1.7.2","Automattic","https:\u002F\u002Fprofiles.wordpress.org\u002Fautomattic\u002F","\u003Cp>Limit the number of login attempts possible both through normal login as well as using auth cookies.\u003C\u002Fp>\n\u003Cp>By default WordPress allows unlimited login attempts either through the login page or by sending special cookies. This allows passwords (or hashes) to be brute-force cracked with relative ease.\u003C\u002Fp>\n\u003Cp>Limit Login Attempts blocks an Internet address from making further attempts after a specified limit on retries is reached, making a brute-force attack difficult or impossible.\u003C\u002Fp>\n\u003Cp>Features\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Limit the number of retry attempts when logging in (for each IP). Fully customizable\u003C\u002Fli>\n\u003Cli>Limit the number of attempts to log in using auth cookies in same way\u003C\u002Fli>\n\u003Cli>Informs user about remaining retries or lockout time on login page\u003C\u002Fli>\n\u003Cli>Optional logging, optional email notification\u003C\u002Fli>\n\u003Cli>Handles server behind reverse proxy\u003C\u002Fli>\n\u003Cli>It is possible to whitelist IPs using a filter. But you probably shouldn’t. 🙂\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Translations: Bulgarian, Brazilian Portuguese, Catalan, Chinese (Traditional), Czech, Dutch, Finnish, French, German, Hungarian, Norwegian, Persian, Romanian, Russian, Spanish, Swedish, Turkish\u003C\u002Fp>\n\u003Cp>Plugin uses standard actions and filters only.\u003C\u002Fp>\n","Limit rate of login attempts, including by way of cookies, for each IP. Fully customizable.",300000,2279689,92,202,"2023-04-04T19:15:00.000Z","6.2.9","2.8",[20,22,23],"http:\u002F\u002Fdevel.kostdoktorn.se\u002Flimit-login-attempts","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flimit-login-attempts.1.7.2.zip",82,"2023-04-10 00:00:00",{"attackSurface":179,"codeSignals":283,"taintFlows":382,"riskAssessment":399,"analyzedAt":414},{"hooks":180,"ajaxHandlers":269,"restRoutes":279,"shortcodes":280,"cronEvents":281,"entryPointCount":282,"unprotectedCount":27},[181,186,191,195,198,201,204,206,209,213,217,222,226,229,233,237,240,243,247,250,254,258,261,264],{"type":182,"name":183,"callback":183,"file":184,"line":185},"action","wp_login_failed","classes\\plugin.php",78,{"type":187,"name":188,"callback":188,"priority":189,"file":184,"line":190},"filter","wp_authenticate_user",99999,79,{"type":187,"name":192,"callback":193,"file":184,"line":194},"shake_error_codes","failure_shake",81,{"type":182,"name":196,"callback":197,"file":184,"line":176},"login_head","add_error_message",{"type":182,"name":199,"callback":200,"file":184,"line":14},"login_errors","fixup_error_messages",{"type":182,"name":202,"callback":202,"file":184,"line":203},"network_admin_menu",86,{"type":182,"name":205,"callback":205,"file":184,"line":87},"admin_menu",{"type":187,"name":207,"callback":208,"file":184,"line":146},"xmlrpc_login_error","xmlrpc_error_messages",{"type":182,"name":210,"callback":211,"file":184,"line":212},"wp_head","add_wc_notices",97,{"type":182,"name":214,"callback":215,"priority":109,"file":184,"line":216},"wp_authenticate","track_credentials",104,{"type":182,"name":218,"callback":219,"priority":220,"file":184,"line":221},"authenticate","authenticate_filter",5,105,{"type":182,"name":223,"callback":224,"file":184,"line":225},"init","check_xmlrpc_lock",108,{"type":182,"name":227,"callback":227,"file":184,"line":228},"admin_enqueue_scripts",113,{"type":187,"name":230,"callback":231,"priority":109,"file":184,"line":232},"wps_limit_login_whitelist_ip","check_whitelist_ips",114,{"type":187,"name":234,"callback":235,"priority":109,"file":184,"line":236},"wps_limit_login_blacklist_ip","check_blacklist_ips",115,{"type":182,"name":238,"callback":238,"file":184,"line":239},"login_form",116,{"type":182,"name":241,"callback":241,"file":184,"line":242},"login_enqueue_scripts",117,{"type":182,"name":244,"callback":245,"file":184,"line":246},"admin_init","reinitialize",118,{"type":182,"name":244,"callback":248,"file":184,"line":249},"load_plugin",120,{"type":182,"name":251,"callback":252,"file":184,"line":253},"wp_dashboard_setup","add_dashboard_widgets",129,{"type":187,"name":255,"callback":255,"priority":256,"file":184,"line":257},"admin_footer_text",1,131,{"type":187,"name":259,"callback":259,"file":184,"line":260},"admin_footer",132,{"type":187,"name":262,"callback":262,"file":184,"line":263},"wps_bidouille_not_display_pub_array",134,{"type":182,"name":265,"callback":266,"file":267,"line":268},"plugins_loaded","plugins_loaded_wps_limit_login_plugin","wps-limit-login.php",44,[270,276],{"action":271,"nopriv":272,"callback":273,"hasNonce":274,"hasCapCheck":272,"file":184,"line":275},"wps-limit-login-unlock",false,"ajax_unlock",true,111,{"action":277,"nopriv":272,"callback":277,"hasNonce":274,"hasCapCheck":274,"file":184,"line":278},"wpslimitlogin_rated",133,[],[],[],2,{"dangerousFunctions":284,"sqlUsage":285,"outputEscaping":295,"fileOperations":27,"externalRequests":256,"nonceChecks":380,"capabilityChecks":26,"bundledLibraries":381},[],{"prepared":27,"raw":26,"locations":286},[287,291,294],{"file":288,"line":289,"context":290},"uninstall.php",15,"$wpdb->get_results() with variable interpolation",{"file":288,"line":292,"context":293},57,"$wpdb->query() with variable interpolation",{"file":288,"line":176,"context":293},{"escaped":296,"rawEcho":297,"locations":298},16,46,[299,302,303,306,308,310,312,314,316,317,318,319,322,324,325,327,329,332,334,336,337,338,339,340,341,342,345,347,349,351,353,354,355,357,359,360,361,362,365,366,368,370,372,374,376,378],{"file":300,"line":70,"context":301},"blocks\\blacklist.php","raw output",{"file":300,"line":296,"context":301},{"file":304,"line":305,"context":301},"blocks\\log.php",12,{"file":304,"line":307,"context":301},21,{"file":304,"line":309,"context":301},53,{"file":304,"line":311,"context":301},73,{"file":304,"line":313,"context":301},74,{"file":304,"line":315,"context":301},75,{"file":304,"line":74,"context":301},{"file":304,"line":118,"context":301},{"file":304,"line":225,"context":301},{"file":320,"line":321,"context":301},"blocks\\pub-wpserveur.php",68,{"file":320,"line":323,"context":301},69,{"file":320,"line":323,"context":301},{"file":320,"line":326,"context":301},70,{"file":320,"line":328,"context":301},71,{"file":330,"line":331,"context":301},"blocks\\pub.php",62,{"file":330,"line":333,"context":301},64,{"file":330,"line":335,"context":301},66,{"file":330,"line":321,"context":301},{"file":330,"line":321,"context":301},{"file":330,"line":323,"context":301},{"file":330,"line":323,"context":301},{"file":330,"line":326,"context":301},{"file":330,"line":328,"context":301},{"file":343,"line":344,"context":301},"blocks\\pub_wpboutik.php",207,{"file":343,"line":346,"context":301},211,{"file":348,"line":296,"context":301},"blocks\\settings.php",{"file":348,"line":350,"context":301},47,{"file":348,"line":352,"context":301},49,{"file":348,"line":309,"context":301},{"file":348,"line":292,"context":301},{"file":348,"line":356,"context":301},59,{"file":348,"line":358,"context":301},63,{"file":348,"line":335,"context":301},{"file":348,"line":185,"context":301},{"file":348,"line":203,"context":301},{"file":363,"line":364,"context":301},"blocks\\whitelist.php",11,{"file":363,"line":296,"context":301},{"file":363,"line":367,"context":301},19,{"file":184,"line":369,"context":301},1236,{"file":184,"line":371,"context":301},1282,{"file":184,"line":373,"context":301},1421,{"file":184,"line":375,"context":301},1426,{"file":184,"line":377,"context":301},1428,{"file":184,"line":379,"context":301},1450,4,[],[383],{"entryPoint":384,"graph":385,"unsanitizedCount":256,"severity":398},"\u003Cwhitelist> (blocks\\whitelist.php:0)",{"nodes":386,"edges":396},[387,391],{"id":388,"type":389,"label":390,"file":363,"line":70},"n0","source","$_SERVER",{"id":392,"type":393,"label":394,"file":363,"line":296,"wp_function":395},"n1","sink","echo() [XSS]","echo",[397],{"from":388,"to":392,"sanitized":272},"low",{"summary":400,"deductions":401},"The wps-limit-login plugin v1.5.9.2 presents a mixed security posture.  While the static analysis indicates a small attack surface with no immediate unprotected entry points and a reasonable number of capability and nonce checks for its AJAX handlers, several concerns arise from the code analysis and historical vulnerability data. The significant percentage of improperly escaped output (74%) is a major red flag, suggesting a high risk of Cross-Site Scripting (XSS) vulnerabilities.  Furthermore, all SQL queries lack prepared statements, which can lead to SQL injection vulnerabilities, especially when combined with potentially unsanitized input.  The single taint flow with an unsanitized path, although not classified as critical or high, warrants attention as it could represent a localized security weakness.  The plugin's history of three documented CVEs, including one critical and two high-severity vulnerabilities, particularly related to XSS, excessive authentication attempts, and CSRF, indicates a past struggle with robust security implementation.  The last vulnerability being in 2019 also suggests potential stagnation in security updates.  While the lack of critical taint flows in the current analysis and the presence of some security checks are positive, the high rate of unescaped output and the historical vulnerability pattern, coupled with raw SQL queries, indicate a substantial risk that needs careful consideration and mitigation.",[402,404,406,409,412],{"reason":403,"points":289},"High percentage of unescaped output",{"reason":405,"points":109},"All SQL queries lack prepared statements",{"reason":407,"points":408},"Taint flow with unsanitized path",8,{"reason":410,"points":411},"History of 1 critical CVE",20,{"reason":413,"points":296},"History of 2 high CVEs","2026-03-16T17:05:24.856Z",{"wat":416,"direct":425},{"assetPaths":417,"generatorPatterns":420,"scriptPaths":421,"versionParams":422},[418,419],"\u002Fwp-content\u002Fplugins\u002Fwps-limit-login\u002Fassets\u002Fcss\u002Fwps-limit-login.css","\u002Fwp-content\u002Fplugins\u002Fwps-limit-login\u002Fassets\u002Fjs\u002Fwps-limit-login.js",[],[419],[423,424],"wps-limit-login\u002Fassets\u002Fcss\u002Fwps-limit-login.css?ver=","wps-limit-login\u002Fassets\u002Fjs\u002Fwps-limit-login.js?ver=",{"cssClasses":426,"htmlComments":428,"htmlAttributes":431,"restEndpoints":433,"jsGlobals":434,"shortcodeOutput":436},[427],"wps-limit-login-admin-notice",[429,430],"\u003C!-- WPS Limit Login -->","\u003C!-- WPS Limit Login : DO NOT MODIFY THIS FILE -->",[432],"data-wps-limit-login-options",[],[435],"wpsLimitLoginOptions",[]]