Comments Users Mentions Security & Risk Analysis

wordpress.org/plugins/comments-users-mentions

Allows to mention Wordpress users in a comment. The mentioned users will receive a notification email.

10 active installs v0.2 PHP + WP 3.1+ Updated Feb 21, 2014
commentsemailmentions
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Comments Users Mentions Safe to Use in 2026?

Generally Safe

Score 85/100

Comments Users Mentions has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "comments-users-mentions" plugin version 0.2 exhibits a generally strong security posture based on the provided static analysis. It demonstrates excellent practices by exclusively using prepared statements for its single SQL query and ensuring all outputs are properly escaped. Furthermore, there are no identified file operations, external HTTP requests, or bundled libraries, which significantly reduces potential attack vectors.

However, a critical concern arises from the use of the `create_function()` PHP function. This function is deprecated and can be a source of vulnerabilities if not handled with extreme care, as it allows for dynamic code execution. While no taint flows or dangerous code interactions were identified in the analysis, the presence of `create_function()` represents an inherent risk that could be exploited if it's used in conjunction with user-supplied input without proper sanitization.

The plugin also has no recorded vulnerability history, which is a positive indicator. Coupled with the lack of identified entry points with missing authentication or permission checks, this suggests that any existing code, including the `create_function()` usage, may not be directly exposed to external manipulation. Despite this, the presence of `create_function()` alone warrants a deduction due to its inherent security implications.

Key Concerns

  • Use of deprecated and dangerous create_function()
Vulnerabilities
None known

Comments Users Mentions Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Comments Users Mentions Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
1 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_filter( 'wp_mail_content_type', create_function( '', 'return "text/html"; ' ) );comments-users-mentions.php:77

SQL Query Safety

100% prepared1 total queries
Attack Surface

Comments Users Mentions Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitcomments-users-mentions.php:27
filterwp_mail_content_typecomments-users-mentions.php:77
actioncomment_postcomments-users-mentions.php:87
Maintenance & Trust

Comments Users Mentions Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedFeb 21, 2014
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Developer Profile

Comments Users Mentions Developer Profile

baxeico

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Comments Users Mentions

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Comments Users Mentions