CMC ROLE Security & Risk Analysis

wordpress.org/plugins/cmc-role

Manages User Roles

0 active installs v0.0.1 PHP + WP 4.6.0+ Updated May 25, 2017
capabilitiesrole-usersrolesuser-rolesusers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is CMC ROLE Safe to Use in 2026?

Generally Safe

Score 85/100

CMC ROLE has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The cmc-role v0.0.1 plugin presents a mixed security picture. On the positive side, there are no reported vulnerabilities in its history and the code exhibits good practices such as using prepared statements for all SQL queries and implementing nonce and capability checks. The absence of a large attack surface, external HTTP requests, and file operations is also reassuring.

However, significant concerns arise from the static analysis. A notable 41% of output escaping is not properly handled, which could lead to cross-site scripting (XSS) vulnerabilities. Furthermore, the taint analysis reveals two flows with unsanitized paths, one of which is rated as high severity. This indicates potential for malicious data to be processed or executed without adequate sanitization, which is a critical risk.

While the plugin's vulnerability history is clean, this does not negate the risks identified in the current code analysis. The high number of improperly escaped outputs and the high-severity tainted flow suggest a need for immediate attention. The plugin demonstrates a commitment to some security best practices but has critical gaps in output sanitization and input validation, posing a notable risk.

Key Concerns

  • High severity taint flow found
  • Unsanitized paths in taint flows
  • Significant percentage of unescaped output
Vulnerabilities
None known

CMC ROLE Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

CMC ROLE Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
44
30 escaped
Nonce Checks
8
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

41% escaped74 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

4 flows2 with unsanitized paths
process_bulk_action (include\class-cmc-role-table.php:166)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

CMC ROLE Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionplugins_loadedcmc-role.php:90
actionadmin_menucmc-role.php:116
filterset-screen-optioncmc-role.php:117
actionadmin_noticescmc-role.php:196
actionadmin_noticescmc-role.php:219
actionadmin_noticescmc-role.php:274
actionadmin_noticescmc-role.php:313
actionadmin_noticescmc-role.php:350
Maintenance & Trust

CMC ROLE Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedMay 25, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

CMC ROLE Developer Profile

Edem

2 plugins · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CMC ROLE

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cmc-role/include/class-cmc-role-table.php/wp-content/plugins/cmc-role/page/admin.php/wp-content/plugins/cmc-role/TipTip/jquery.tipTip.js/wp-content/plugins/cmc-role/TipTip/tipTip.css/wp-content/plugins/cmc-role/font-awesome/css/font-awesome.min.css/wp-content/plugins/cmc-role/jquery-ui/jquery-ui.css
Script Paths
/wp-content/plugins/cmc-role/TipTip/jquery.tipTip.js

HTML / DOM Fingerprints

Data Attributes
data-cmcrm-action
JS Globals
CMCRM_JS_URLCMCRM_CSS_URL
FAQ

Frequently Asked Questions about CMC ROLE