Almost Users Only Security & Risk Analysis

wordpress.org/plugins/almost-users-only

If logged in, the visitor can view all the pages/posts on the blog. If not logged in, the visitor can only view a specific public page.

10 active installs v1.0 PHP + WP 3.0+ Updated Nov 29, 2012
accessaccountspermissionsusers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Almost Users Only Safe to Use in 2026?

Generally Safe

Score 85/100

Almost Users Only has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "almost-users-only" v1.0 plugin exhibits a very strong security posture based on the provided static analysis and vulnerability history. The absence of any identified dangerous functions, raw SQL queries, unescaped output, file operations, or external HTTP requests is highly commendable. Furthermore, the presence of nonce and capability checks, coupled with 100% usage of prepared statements for the limited SQL queries, indicates robust security practices. The zero taint flows with unsanitized paths and the complete lack of known vulnerabilities in its history further bolster this assessment, suggesting a well-developed and secure plugin.

While the plugin presents an exceptionally clean bill of health, the complete lack of any attack surface entry points (AJAX, REST API, shortcodes, cron events) is noteworthy. This could indicate a plugin with minimal functionality or one that integrates deeply without exposing direct hooks. In scenarios with more extensive functionality, a larger attack surface might be expected. However, given the data, this is not a concern but rather a characteristic. The plugin's strengths lie in its disciplined coding practices and its unblemished security record, making it appear very low risk.

Vulnerabilities
None known

Almost Users Only Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Almost Users Only Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Almost Users Only Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
3 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped3 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
process_mp_auo_options (users-only.php:60)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Almost Users Only Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwp_headusers-only.php:13
actionadmin_menuusers-only.php:29
actionadmin_initusers-only.php:54
actionadmin_post_save_mp_auo_optionsusers-only.php:57
Maintenance & Trust

Almost Users Only Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedNov 29, 2012
PHP min version
Downloads2K

Community Trust

Rating66/100
Number of ratings3
Active installs10
Developer Profile

Almost Users Only Developer Profile

Mads Phikamphon

2 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Almost Users Only

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
mp_uo_general
FAQ

Frequently Asked Questions about Almost Users Only