Advance User Post CRUD Security & Risk Analysis

wordpress.org/plugins/advance-user-post-crud

Advance User CRUD lets you see different posts, pages and attachments created by a user. And lets you manage the user generated posts.

10 active installs v1.3 PHP 8.2+ WP 5.6+ Updated Jan 1, 2026
page-countpost-countpost-publishpost-viewsstats
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Advance User Post CRUD Safe to Use in 2026?

Generally Safe

Score 100/100

Advance User Post CRUD has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The "advance-user-post-crud" plugin v1.3 exhibits a strong security posture based on the provided static analysis. The absence of any detected AJAX handlers, REST API routes, shortcodes, or cron events without proper authentication or permission checks significantly limits the attack surface. Furthermore, the code shows good practices with all SQL queries utilizing prepared statements and a high percentage of output escaping, along with the presence of nonce and capability checks. The vulnerability history being completely clean further bolsters confidence in its security. However, the limited number of analyzed taint flows (2) means there might be undetected vulnerabilities in areas not covered by the analysis. While the current analysis indicates a secure plugin, ongoing vigilance and comprehensive testing are always recommended.

Vulnerabilities
None known

Advance User Post CRUD Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Advance User Post CRUD Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
14
64 escaped
Nonce Checks
1
Capability Checks
5
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

82% escaped78 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
adv_author_post_type_tables (includes\class-adv-user-crud.php:257)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Advance User Post CRUD Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionwp_dashboard_setupadv_user_widget.php:26
actionplugins_loadedcustom-post-count.php:62
actionadmin_menuincludes\class-adv-user-crud.php:28
actionadmin_enqueue_scriptsincludes\class-adv-user-crud.php:29
filteruser_row_actionsincludes\class-adv-user-crud.php:30
actiondelete_user_formincludes\class-adv-user-crud.php:31
filterset-screen-optionincludes\class-adv-user-crud.php:32
Maintenance & Trust

Advance User Post CRUD Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 1, 2026
PHP min version8.2
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Advance User Post CRUD Developer Profile

KrishaWeb

13 plugins · 17K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
655 days
View full developer profile
Detection Fingerprints

How We Detect Advance User Post CRUD

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/advance-user-post-crud/assets/css/style.css/wp-content/plugins/advance-user-post-crud/assets/js/setting.js
Script Paths
/wp-content/plugins/advance-user-post-crud/assets/js/setting.js
Version Parameters
advance-user-post-crud/assets/css/style.css?ver=advance-user-post-crud/assets/js/setting.js?ver=

HTML / DOM Fingerprints

CSS Classes
view_frontend_profile
FAQ

Frequently Asked Questions about Advance User Post CRUD