
User Cleaner Security & Risk Analysis
wordpress.org/plugins/ajdg-user-cleanerIf an account is registered and nothing is done with it the account is deleted after two weeks.
Is User Cleaner Safe to Use in 2026?
Generally Safe
Score 100/100User Cleaner has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "ajdg-user-cleaner" plugin v1.1 exhibits a generally good security posture, with no reported vulnerabilities (CVEs) and no critical or high severity issues identified in the static analysis or taint flows. The absence of dangerous functions, file operations, external HTTP requests, and the presence of 100% output escaping are strong indicators of secure coding practices. The plugin's attack surface is also minimal, with no AJAX handlers, REST API routes, or shortcodes, and the single cron event is not specified as unprotected.
However, there are areas for improvement. The presence of a single SQL query that does not utilize prepared statements is a notable concern. While the query itself isn't flagged as problematic in the taint analysis, it represents a potential risk of SQL injection if the data processed by this query were ever to become user-controlled without proper sanitization elsewhere. The lack of explicit nonce and capability checks on any entry points, while not identified as an issue in this specific version, could become a vulnerability if the plugin's functionality were to expand or if the analysis missed subtle interdependencies.
Overall, the plugin appears robust for its current version, benefiting from a clean vulnerability history and good output handling. The primary risk lies in the un-prepared SQL statement, which, though not currently exploited, warrants attention for future development. The absence of known vulnerabilities and critical code signals suggests a developer who is conscious of security, but attention to prepared statements is key for long-term resilience.
Key Concerns
- Raw SQL query without prepared statements
User Cleaner Security Vulnerabilities
User Cleaner Code Analysis
SQL Query Safety
User Cleaner Attack Surface
WordPress Hooks 2
Scheduled Events 1
Maintenance & Trust
User Cleaner Maintenance & Trust
Maintenance Signals
Community Trust
User Cleaner Alternatives
Password Strength Settings for WooCommerce
wc-password-strength-settings
Help secure your WooCommerce site by enforcing stronger passwords and taking additional control of your strength requirements.
Simple Membership Custom Messages
simple-membership-custom-messages
Simple Membership Addon to customize various content protection messages.
Bulk Delete Users by Keyword
bulk-delete-users-by-keyword
Efficiently manage your WordPress users with keyword-based bulk deletion capabilities.
Empty WP Blog/Website
empty-wp-blog-or-website
One click solution for make your blog/website empty. Delete all your posts, pages, media(images,videos,etc) , tags and categories.
Users Bulk Delete With Preview
users-bulk-delete-with-preview
Easily delete multiple WordPress users with the Users Bulk Delete With Preview plugin. Preview details before removal for accuracy and better control.
User Cleaner Developer Profile
6 plugins · 23K total installs
How We Detect User Cleaner
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
<!-- COPYRIGHT NOTICE-->