CellarWeb User Profile Access Control Security & Risk Analysis

wordpress.org/plugins/cellarweb-user-profile-access-control

Allows you to prevent individual users from editing/changing their user profile. User profile edit/change is allowed (and can't be blocked) for r …

0 active installs v1.01 PHP 7.2+ WP 4.9+ Updated Unknown
user-profile-access-control
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CellarWeb User Profile Access Control Safe to Use in 2026?

Generally Safe

Score 100/100

CellarWeb User Profile Access Control has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The static analysis of 'cellarweb-user-profile-access-control' v1.01 reveals a plugin with a minimal attack surface and good internal security practices. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits potential entry points for attackers. Furthermore, all SQL queries utilize prepared statements, mitigating SQL injection risks. The plugin also demonstrates some level of capability checks within its code. However, a significant concern arises from the low percentage of properly escaped output. With only 22% of identified outputs being properly escaped, there is a substantial risk of cross-site scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the user interface.

The vulnerability history for this plugin is currently clean, with no recorded CVEs. This absence of past vulnerabilities, combined with the good internal practices observed in the code, suggests a generally well-maintained plugin. However, the low output escaping rate remains a critical weakness that could lead to vulnerabilities despite the lack of historical issues. The plugin's strengths lie in its limited attack surface and secure database interaction, while its primary weakness is the insufficient sanitization of output, posing a direct risk of XSS.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

CellarWeb User Profile Access Control Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

CellarWeb User Profile Access Control Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
2 escaped
Nonce Checks
0
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

22% escaped9 total outputs
Attack Surface

CellarWeb User Profile Access Control Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
actionadmin_initcellarweb-user-profile-access-control.php:48
actionadmin_noticescellarweb-user-profile-access-control.php:49
actionnetwork_admin_initcellarweb-user-profile-access-control.php:50
actionnetwork_admin_noticescellarweb-user-profile-access-control.php:51
actionadmin_menucellarweb-user-profile-access-control.php:99
actionadmin_initcellarweb-user-profile-access-control.php:100
actionpersonal_optionscellarweb-user-profile-access-control.php:231
actionedit_user_profile_updatecellarweb-user-profile-access-control.php:232
actionwp_before_admin_bar_rendercellarweb-user-profile-access-control.php:234
actionadmin_menucellarweb-user-profile-access-control.php:235
actionload-profile.phpcellarweb-user-profile-access-control.php:319
actionall_admin_noticescellarweb-user-profile-access-control.php:329
actionload-profile.phpcellarweb-user-profile-access-control.php:333
actionprofile_updatecellarweb-user-profile-access-control.php:368
Maintenance & Trust

CellarWeb User Profile Access Control Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedUnknown
PHP min version7.2
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Alternatives

CellarWeb User Profile Access Control Alternatives

No alternatives data available yet.

Developer Profile

CellarWeb User Profile Access Control Developer Profile

Rick Hellewell

16 plugins · 1K total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CellarWeb User Profile Access Control

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cellarweb-user-profile-access-control/css/settings.css
Version Parameters
cellarweb-user-profile-access-control/css/settings.css?ver=

HTML / DOM Fingerprints

CSS Classes
CWUPAC_optionsCWUPAC_sidebar
Data Attributes
name="cellarweb_upac_option_name[cwupac_profile_block]"id="cwupac_profile_block"name="cellarweb_upac_option_name[cwupac_send_notice]"id="cwupac_send_notice"
FAQ

Frequently Asked Questions about CellarWeb User Profile Access Control