User Cleaner Security & Risk Analysis

wordpress.org/plugins/ajdg-user-cleaner

If an account is registered and nothing is done with it the account is deleted after two weeks.

10 active installs v1.1 PHP 8.0+ WP 5.8+ Updated Dec 24, 2025
accountsdelete-accountsdelete-usersprotectionusers
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is User Cleaner Safe to Use in 2026?

Generally Safe

Score 100/100

User Cleaner has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The "ajdg-user-cleaner" plugin v1.1 exhibits a generally good security posture, with no reported vulnerabilities (CVEs) and no critical or high severity issues identified in the static analysis or taint flows. The absence of dangerous functions, file operations, external HTTP requests, and the presence of 100% output escaping are strong indicators of secure coding practices. The plugin's attack surface is also minimal, with no AJAX handlers, REST API routes, or shortcodes, and the single cron event is not specified as unprotected.

However, there are areas for improvement. The presence of a single SQL query that does not utilize prepared statements is a notable concern. While the query itself isn't flagged as problematic in the taint analysis, it represents a potential risk of SQL injection if the data processed by this query were ever to become user-controlled without proper sanitization elsewhere. The lack of explicit nonce and capability checks on any entry points, while not identified as an issue in this specific version, could become a vulnerability if the plugin's functionality were to expand or if the analysis missed subtle interdependencies.

Overall, the plugin appears robust for its current version, benefiting from a clean vulnerability history and good output handling. The primary risk lies in the un-prepared SQL statement, which, though not currently exploited, warrants attention for future development. The absence of known vulnerabilities and critical code signals suggests a developer who is conscious of security, but attention to prepared statements is key for long-term resilience.

Key Concerns

  • Raw SQL query without prepared statements
Vulnerabilities
None known

User Cleaner Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

User Cleaner Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries
Attack Surface

User Cleaner Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionajdg_usercleanerajdg-user-cleaner.php:30
filterplugin_row_metaajdg-user-cleaner.php:31

Scheduled Events 1

ajdg_usercleaner
Maintenance & Trust

User Cleaner Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 24, 2025
PHP min version8.0
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

User Cleaner Developer Profile

Arnan de Gans

6 plugins · 23K total installs

76
trust score
Avg Security Score
95/100
Avg Patch Time
1353 days
View full developer profile
Detection Fingerprints

How We Detect User Cleaner

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- COPYRIGHT NOTICE-->
FAQ

Frequently Asked Questions about User Cleaner