ACF: User Role Selector Security & Risk Analysis

wordpress.org/plugins/acf-role-selector-field

A field for Advanced Custom Fields which allows you to select one or more user roles

700 active installs v3.0.2 PHP + WP 3.4+ Updated Apr 27, 2015
acfcustom-fields
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ACF: User Role Selector Safe to Use in 2026?

Generally Safe

Score 85/100

ACF: User Role Selector has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The static analysis of acf-role-selector-field v3.0.2 reveals a generally strong security posture. The plugin reports zero AJAX handlers, REST API routes, shortcodes, or cron events, resulting in no discernible attack surface and no unprotected entry points. Furthermore, the absence of dangerous functions, external HTTP requests, and file operations is commendable. All detected SQL queries are correctly implemented using prepared statements. However, a significant concern arises from the complete lack of output escaping, with 0% of 27 total outputs being properly escaped. This indicates a high probability of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data is likely being rendered directly into the HTML without sanitization.

The vulnerability history is clean, with no recorded CVEs, suggesting a good track record. The taint analysis also reports zero flows, which is positive. Despite the clean vulnerability history and robust handling of SQL and entry points, the pervasive lack of output escaping is a critical weakness that needs immediate attention. This single issue significantly elevates the risk profile of the plugin, potentially exposing users to XSS attacks that could lead to session hijacking, defacement, or further malicious actions. While other areas show good security practices, the unescaped output is a glaring omission that overshadows these strengths.

Key Concerns

  • 0% output escaping
Vulnerabilities
None known

ACF: User Role Selector Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

ACF: User Role Selector Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
27
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped27 total outputs
Attack Surface

ACF: User Role Selector Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionplugins_loadedacf-role_selector.php:15
actionacf/include_field_typesacf-role_selector.php:30
actionacf/register_fieldsacf-role_selector.php:44
Maintenance & Trust

ACF: User Role Selector Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedApr 27, 2015
PHP min version
Downloads10K

Community Trust

Rating100/100
Number of ratings3
Active installs700
Developer Profile

ACF: User Role Selector Developer Profile

danielpataki

12 plugins · 7K total installs

83
trust score
Avg Security Score
84/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ACF: User Role Selector

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/acf-role-selector-field/css/acf-role-selector-field.css/wp-content/plugins/acf-role-selector-field/js/acf-role-selector-field.js
Script Paths
/wp-content/plugins/acf-role-selector-field/js/acf-role-selector-field.js
Version Parameters
acf-role-selector-field/css/acf-role-selector-field.css?ver=acf-role-selector-field/js/acf-role-selector-field.js?ver=

HTML / DOM Fingerprints

CSS Classes
acf-role-selector-field
FAQ

Frequently Asked Questions about ACF: User Role Selector