Content Visibility User Role Security & Risk Analysis

wordpress.org/plugins/content-visibility-user-role

A user roles add-on for Content Visibility.

10 active installs v0.1.6 PHP 7.0+ WP 5.0+ Updated Feb 9, 2023
blockcontentuserusersvisibility
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Content Visibility User Role Safe to Use in 2026?

Generally Safe

Score 85/100

Content Visibility User Role has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "content-visibility-user-role" plugin, version 0.1.6, exhibits a very strong security posture based on the provided static analysis. The code does not appear to expose any direct entry points such as AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code signals indicate a clean codebase with no dangerous functions, all SQL queries using prepared statements, and all output being properly escaped. The absence of file operations and external HTTP requests further strengthens its security profile. The taint analysis also shows no flows with unsanitized paths, which is a significant positive finding.

The vulnerability history is also clean, with no recorded CVEs, meaning there are no known unpatched vulnerabilities associated with this plugin. This suggests a well-maintained and security-conscious development approach. The combination of a minimal attack surface, robust code practices, and a clean vulnerability history points to a plugin that is likely very safe to use. The only potential area of note, though not a direct risk in this analysis, is the complete lack of any capability checks or nonce checks. While the current lack of entry points means this is not exploitable, it's a good practice to include these for future-proofing if new features or entry points are added.

Key Concerns

  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Content Visibility User Role Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Content Visibility User Role Release Timeline

v0.1.6Current
v0.1.5
v0.1.4
v0.1.3
v0.1.2
v0.1.1
Code Analysis
Analyzed Mar 17, 2026

Content Visibility User Role Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Content Visibility User Role Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioncontent_visibility_enqueue_editor_assetsincludes\block-visibility-user-role.php:16
filtercontent_visibility_rule_types_and_callbacksincludes\block-visibility-user-role.php:72
Maintenance & Trust

Content Visibility User Role Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedFeb 9, 2023
PHP min version7.0
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Content Visibility User Role Developer Profile

Rich Tape

6 plugins · 140 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Content Visibility User Role

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/content-visibility-user-role/build/index.js/wp-content/plugins/content-visibility-user-role/build/index.css
Script Paths
/wp-content/plugins/content-visibility-user-role/build/index.js
Version Parameters
content-visibility-user-role/build/index.js?ver=content-visibility-user-role-panel/build/index.css?ver=

HTML / DOM Fingerprints

JS Globals
BlockVisibilityUserRole
FAQ

Frequently Asked Questions about Content Visibility User Role