AccessType Security & Risk Analysis

wordpress.org/plugins/accesstype

Accesstype manages subscriptions, adds metered and hard paywall, with onetime and recurring subscription plans for continuous content monetization.

0 active installs v1.0.5 PHP 5.6.20+ WP 5.4.0+ Updated Nov 17, 2021
freemetered-paywallpaywallsubscription-managementsubscriptions
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is AccessType Safe to Use in 2026?

Generally Safe

Score 85/100

AccessType has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The 'accesstype' plugin v1.0.5 exhibits a mixed security posture. On the positive side, it demonstrates good practices by not utilizing dangerous functions, not performing file operations, not making external HTTP requests, and all detected SQL queries are properly prepared. The absence of any known vulnerabilities in its history is also a strong indicator of careful development. However, there are significant concerns regarding the attack surface. Two of the five identified entry points, specifically the REST API routes, lack permission callbacks, which means they could be accessed and potentially manipulated by unauthenticated users. Furthermore, only 29% of output is properly escaped, suggesting a potential for cross-site scripting (XSS) vulnerabilities in areas not covered by the limited taint analysis. While taint analysis found no issues, this may be due to the limited scope or the nature of the code.

In conclusion, while the plugin has a clean vulnerability history and employs secure coding practices for database interactions and external requests, the unauthenticated REST API routes and the low rate of output escaping represent notable security weaknesses. These areas present a clear risk that could be exploited if not addressed. The strengths lie in the absence of known severe code issues, but the weaknesses in input validation and output sanitization, especially for public-facing endpoints, require attention.

Key Concerns

  • Unprotected REST API routes
  • Low percentage of properly escaped output
Vulnerabilities
None known

AccessType Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

AccessType Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
6 escaped
Nonce Checks
2
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

29% escaped21 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<functions> (includes\functions\functions.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

AccessType Attack Surface

Entry Points5
Unprotected2

AJAX Handlers 1

authwp_ajax_accesstype_save_bulkincludes\functions\functions.php:211

REST API Routes 2

GET/wp-json/accesstype/v1/post/attributesincludes\apis.php:36
POST/wp-json/accesstype/v1/set-at-meter-cookieincludes\apis.php:42

Shortcodes 2

[accesstype_display_subscriptions] includes\shortcodes.php:41
[accesstype_display_subscription_plans] includes\shortcodes.php:97
WordPress Hooks 16
actionplugins_loadedaccesstype.php:32
actionrest_api_initincludes\apis.php:34
filterscript_loader_tagincludes\functions\functions.php:71
actionwp_enqueue_scriptsincludes\functions\functions.php:85
actionadmin_initincludes\functions\functions.php:140
actionadmin_menuincludes\functions\functions.php:164
actionadmin_enqueue_scriptsincludes\functions\functions.php:182
filtermanage_posts_columnsincludes\functions\functions.php:225
actionmanage_posts_custom_columnincludes\functions\functions.php:243
actionquick_edit_custom_boxincludes\functions\functions.php:277
actionbulk_edit_custom_boxincludes\functions\functions.php:278
filterthe_contentincludes\functions\functions.php:319
actionload-post.phpincludes\functions\metaboxes.php:9
actionload-post-new.phpincludes\functions\metaboxes.php:10
actionadd_meta_boxesincludes\functions\metaboxes.php:18
actionsave_postincludes\functions\metaboxes.php:72
Maintenance & Trust

AccessType Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedNov 17, 2021
PHP min version5.6.20
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

AccessType Developer Profile

Quintype

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AccessType

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/accesstype/public/scripts/accesstype_ui.js/wp-content/plugins/accesstype/admin/styles/accesstype_admin.css/wp-content/plugins/accesstype/admin/scripts/accesstype_admin.js/wp-content/plugins/accesstype/admin/scripts/accesstype_populate.js
Script Paths
https://staging.accesstype.com/frontend/v2/ui/accesstype?key=https://www.accesstype.com/frontend/v2/ui/accesstype?key=

HTML / DOM Fingerprints

CSS Classes
accesstype-subscription-plans
Data Attributes
accesstype-account-keyaccesstype-jwt-secretaccesstype-subscription-plan-pageaccesstype-login-redirect-pageaccesstype-primary-coloraccesstype-secondary-color+4 more
JS Globals
accesstype_populate
Shortcode Output
[accesstype_plans]
FAQ

Frequently Asked Questions about AccessType