Content User Relations Security & Risk Analysis

wordpress.org/plugins/content-user-relations

Relate user states to your contents.

0 active installs v1.1.2 PHP + WP 4.0+ Updated Jun 17, 2019
metaboxrelationuser
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Content User Relations Safe to Use in 2026?

Generally Safe

Score 85/100

Content User Relations has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "content-user-relations" plugin v1.1.2 presents a mixed security posture. On the positive side, it boasts a small attack surface with no direct AJAX handlers, REST API routes, shortcodes, or cron events accessible. The absence of file operations and external HTTP requests further reduces potential vulnerabilities. However, concerns arise from the code analysis regarding SQL queries and output escaping. A significant portion of SQL queries are not using prepared statements, which can lead to SQL injection vulnerabilities if not handled carefully. Similarly, nearly half of the output operations are not properly escaped, potentially exposing the application to cross-site scripting (XSS) attacks.

The taint analysis, while limited in scope, shows flows with unsanitized paths. Although no critical or high severity issues were flagged here, it indicates potential areas for deeper investigation as unsanitized paths are a common precursor to vulnerabilities. The plugin's vulnerability history is remarkably clean, with no recorded CVEs. This suggests either a history of diligent security practices or a lack of extensive security audits. While the lack of known vulnerabilities is a strength, the identified code-level concerns (raw SQL, unescaped output, and unsanitized paths) are significant weaknesses that could be exploited. The absence of nonce checks and capability checks on potential entry points is also a notable omission that increases risk.

In conclusion, the plugin has strengths in its limited attack surface and clean historical record. However, critical code-level weaknesses in SQL handling and output escaping, coupled with the absence of security best practices like nonce and capability checks on potential interaction points, present real risks. Further analysis and remediation of these specific code issues are recommended to improve its overall security.

Key Concerns

  • SQL queries not using prepared statements
  • Output not properly escaped
  • Flows with unsanitized paths (taint analysis)
  • Missing nonce checks
  • Limited capability checks
Vulnerabilities
None known

Content User Relations Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Content User Relations Code Analysis

Dangerous Functions
0
Raw SQL Queries
9
5 prepared
Unescaped Output
16
23 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

36% prepared14 total queries

Output Escaping

59% escaped39 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
render_settings (inc\settings.php:184)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Content User Relations Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 17
actioninitinc\ajax.php:30
actioninitinc\migrate\migrate-init.php:14
actionadd_meta_boxesinc\post-meta-box.php:40
actionsave_postinc\post-meta-box.php:41
actionthe_postinc\post.php:14
actioninitinc\settings.php:23
actionadmin_menuinc\settings.php:24
actioninitinc\user-profile.php:21
actionadmin_enqueue_scriptsinc\user-profile.php:27
actionshow_user_profileinc\user-profile.php:32
actionedit_user_profileinc\user-profile.php:34
actionpersonal_options_updateinc\user-profile.php:36
actionedit_user_profile_updateinc\user-profile.php:40
actiondelete_userinc\user.php:9
actionpre_get_postsinc\wp-post-query-extension.php:28
filterposts_whereinc\wp-post-query-extension.php:29
actionpre_user_queryinc\wp-user-query-extension.php:23
Maintenance & Trust

Content User Relations Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedJun 17, 2019
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Content User Relations Developer Profile

EdwardBock

22 plugins · 2K total installs

72
trust score
Avg Security Score
90/100
Avg Patch Time
107 days
View full developer profile
Detection Fingerprints

How We Detect Content User Relations

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/content-user-relations/css/meta-box.css/wp-content/plugins/content-user-relations/js/meta-box.js
Script Paths
/wp-content/plugins/content-user-relations/js/meta-box.js
Version Parameters
content-user-relations/css/meta-box.css?ver=content-user-relations/js/meta-box.js?ver=

HTML / DOM Fingerprints

CSS Classes
cur-appcur-meta-box-wrapper
HTML Comments
<!-- cur-app -->
Data Attributes
data-cur-id
JS Globals
ContentUserRelations_MetaBox
FAQ

Frequently Asked Questions about Content User Relations