Change default role dynamically on role selection change ACF role-based conditions on user new / edit form

10 active installs v1.0.8 PHP 7.0+ WP + Updated Jun 5, 2024
acf
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is ACF: Dynamic User Role Safe to Use in 2026?

Generally Safe

Score 92/100

ACF: Dynamic User Role has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The plugin "change-default-role-dynamically-acf-role-based-conditions-on-user-new-edit-form" version 1.0.8 exhibits a generally good security posture due to several positive indicators. All identified entry points, which consist of two AJAX handlers, appear to have authentication checks, and there are no REST API routes, shortcodes, or cron events that could introduce further vulnerabilities. The use of prepared statements for all SQL queries is a significant strength, mitigating the risk of SQL injection. Furthermore, the presence of nonce checks on both AJAX handlers adds another layer of protection.

However, there are a few areas that warrant attention. The code analysis reveals that only 56% of output is properly escaped, which could leave the plugin susceptible to Cross-Site Scripting (XSS) vulnerabilities if unsanitized data is displayed to users. While the taint analysis did not flag any critical or high severity issues, it did identify one flow with an unsanitized path, suggesting a potential, albeit not immediately critical, risk. The absence of capability checks on the entry points is another concern, as it implies that only authentication, and not specific user permissions, is being verified.

Looking at the vulnerability history, the plugin has no recorded CVEs, which is a positive sign indicating a generally secure development history. The lack of recent or historical vulnerabilities suggests that the developers are either proactive in addressing security issues or that the plugin's functionality has not attracted significant malicious attention. Despite this clean history, the identified code signals, particularly the unescaped output and the lack of capability checks, should be addressed to further strengthen the plugin's security. Overall, the plugin is reasonably secure, but improvements in output sanitization and permission checks would enhance its robustness.

Key Concerns

  • Unescaped output detected
  • Flow with unsanitized path
  • No capability checks on entry points
Vulnerabilities
None known

ACF: Dynamic User Role Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

ACF: Dynamic User Role Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
5 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

56% escaped9 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
acf_dynamic_default_role (acf-dynamic-change-on-user-creation.php:22)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

ACF: Dynamic User Role Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_acf_dynamic_user_roleacf-dynamic-change-on-user-creation.php:18
authwp_ajax_acf_dynamic_default_roleacf-dynamic-change-on-user-creation.php:19
WordPress Hooks 1
actionacf/input/admin_headacf-dynamic-change-on-user-creation.php:17
Maintenance & Trust

ACF: Dynamic User Role Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedJun 5, 2024
PHP min version7.0
Downloads1K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Developer Profile

ACF: Dynamic User Role Developer Profile

Mike Kipruto

2 plugins · 40 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ACF: Dynamic User Role

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
window.location.reload
FAQ

Frequently Asked Questions about ACF: Dynamic User Role