Report by Cloudflare

Password reuse is rampant: nearly half of observed user logins are compromised

8 FINDINGSPublished Mar 17, 2025
View Original Report →

Key Findings

Of the successful leaked password login attempts on WordPress sites, 48% are bot-driven. The remaining 52% of successful logins on WordPress sites originate from legitimate, non-bot users.

PasswordsCredentialsLogin attemptLeaked passwordWordPress

59% of human traffic is clean from leaked credentials against 41% with leaked passwords.

PasswordsCredentialsLogin attemptLeaked passwordBot

Only 5% of leaked password login attempts result in access being denied. 90% of these denied requests are bot-driven. The remaining 19% of login attempts fall under other outcomes, such as timeouts or users who changed their passwords

PasswordsCredentialsLogin attemptBotLeaked password

When including bot-driven traffic, 52% of all detected authentication requests contain leaked passwords.

PasswordsCredentialsLogin attemptLeaked passwordBot

95% of login attempts involving leaked passwords are coming from bots.

PasswordsCredentialsLogin attemptLeaked passwordBot

Based on Cloudflare's observed traffic between September - November 2024, 41% of successful logins across websites protected by Cloudflare involve compromised passwords.

PasswordsCredentialsLogin attemptLeaked password

76% of leaked password login attempts for websites built on WordPress are successful.

PasswordsCredentialsLogin attemptLeaked passwordWordPress

Approximately 41% of successful human authentication attempts involve leaked credentials.

PasswordsCredentialsLogin attemptLeaked password