
Content User Relations Security & Risk Analysis
wordpress.org/plugins/content-user-relationsRelate user states to your contents.
Is Content User Relations Safe to Use in 2026?
Generally Safe
Score 85/100Content User Relations has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "content-user-relations" plugin v1.1.2 presents a mixed security posture. On the positive side, it boasts a small attack surface with no direct AJAX handlers, REST API routes, shortcodes, or cron events accessible. The absence of file operations and external HTTP requests further reduces potential vulnerabilities. However, concerns arise from the code analysis regarding SQL queries and output escaping. A significant portion of SQL queries are not using prepared statements, which can lead to SQL injection vulnerabilities if not handled carefully. Similarly, nearly half of the output operations are not properly escaped, potentially exposing the application to cross-site scripting (XSS) attacks.
The taint analysis, while limited in scope, shows flows with unsanitized paths. Although no critical or high severity issues were flagged here, it indicates potential areas for deeper investigation as unsanitized paths are a common precursor to vulnerabilities. The plugin's vulnerability history is remarkably clean, with no recorded CVEs. This suggests either a history of diligent security practices or a lack of extensive security audits. While the lack of known vulnerabilities is a strength, the identified code-level concerns (raw SQL, unescaped output, and unsanitized paths) are significant weaknesses that could be exploited. The absence of nonce checks and capability checks on potential entry points is also a notable omission that increases risk.
In conclusion, the plugin has strengths in its limited attack surface and clean historical record. However, critical code-level weaknesses in SQL handling and output escaping, coupled with the absence of security best practices like nonce and capability checks on potential interaction points, present real risks. Further analysis and remediation of these specific code issues are recommended to improve its overall security.
Key Concerns
- SQL queries not using prepared statements
- Output not properly escaped
- Flows with unsanitized paths (taint analysis)
- Missing nonce checks
- Limited capability checks
Content User Relations Security Vulnerabilities
Content User Relations Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Content User Relations Attack Surface
WordPress Hooks 17
Maintenance & Trust
Content User Relations Maintenance & Trust
Maintenance Signals
Community Trust
Content User Relations Alternatives
Posts 2 Posts
posts-to-posts
Efficient many-to-many connections between posts, pages, custom post types, users.
WP User Profiles
wp-user-profiles
WP User Profiles is a sophisticated way to edit users in WordPress.
Content Relations
content-relations
Add relations between posts.
SlimFAQ
slimfaq
Easy integration of the SlimFAQ sidebar with optional Intercom integration.
Native Content Relationships
native-content-relationships
Add first-class relationships between posts, users, and terms using a fast, structured, and scalable architecture.
Content User Relations Developer Profile
22 plugins · 2K total installs
How We Detect Content User Relations
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/content-user-relations/css/meta-box.css/wp-content/plugins/content-user-relations/js/meta-box.js/wp-content/plugins/content-user-relations/js/meta-box.jscontent-user-relations/css/meta-box.css?ver=content-user-relations/js/meta-box.js?ver=HTML / DOM Fingerprints
cur-appcur-meta-box-wrapper<!-- cur-app -->data-cur-idContentUserRelations_MetaBox