
Controlled Admin Access Security & Risk Analysis
wordpress.org/plugins/controlled-admin-accessGive a temporarily limited admin access to themes designers, plugins developers and support agents.
Is Controlled Admin Access Safe to Use in 2026?
Generally Safe
Score 96/100Controlled Admin Access has a strong security track record. Known vulnerabilities have been patched promptly.
The "controlled-admin-access" plugin version 2.1.2 exhibits a mixed security posture. On the positive side, the static analysis reveals no immediate exploitable attack surface (AJAX, REST API, shortcodes, cron), no dangerous functions are used, all SQL queries are prepared, and there's a single file operation with a nonce check present. This suggests a good understanding of fundamental WordPress security practices in these areas. However, a significant concern arises from the plugin's vulnerability history. It has a history of two critical vulnerabilities, both related to improper access control, with the last one reported in March 2021 and currently patched. This pattern of critical vulnerabilities, even if patched, indicates potential underlying architectural weaknesses that could be re-exploited or manifest in future versions if not thoroughly addressed.
While the current static analysis shows no unsanitized paths in taint flows and a reasonable rate of output escaping, the historical critical vulnerabilities, particularly in access control, cannot be ignored. The absence of critical findings in the current static analysis might be due to the specific version tested or that the previous vulnerabilities were indeed fixed. However, the previous critical issues and the fact that a significant portion of outputs are not properly escaped (68% proper escaping means 32% potentially unescaped) present a tangible risk. The presence of file operations without clear context on their sanitization also warrants caution. Therefore, while the immediate code analysis shows some strengths, the historical critical vulnerabilities and the unescaped output present a notable risk that requires careful consideration and further investigation.
Key Concerns
- Previous critical vulnerabilities, even if patched
- Significant portion of outputs not properly escaped
- File operations present, context of sanitization unclear
Controlled Admin Access Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
Controlled Admin Access < 1.5.6 - Privilege Escalation
Controlled Admin Access <= 1.5.1 - Improper Access Control & Privilege Escalation
Controlled Admin Access Code Analysis
Output Escaping
Controlled Admin Access Attack Surface
WordPress Hooks 19
Maintenance & Trust
Controlled Admin Access Maintenance & Trust
Maintenance Signals
Community Trust
Controlled Admin Access Alternatives
WPFront User Role Editor
wpfront-user-role-editor
Easily allows you to manage WordPress user roles. You can create, edit, delete and manage capabilities, also copy existing roles.
Access Areas for WordPress
wp-access-areas
Fine tuning access to your posts.
User Role Editor
user-role-editor
User Role Editor WordPress plugin makes user roles and capabilities changing easy. Edit/add/delete WordPress user roles and capabilities.
Advanced Access Manager – Access Governance for WordPress
advanced-access-manager
Access Governance for WordPress. Control roles, users, content, admin areas, and APIs to prevent broken access controls and excessive privileges.
User Access Manager
user-access-manager
With the "User Access Manager"-plugin you can manage the access to your posts, pages and files.
Controlled Admin Access Developer Profile
10 plugins · 27K total installs
How We Detect Controlled Admin Access
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/controlled-admin-access/core/app/frontend/app/dist/app.js/wp-content/plugins/controlled-admin-access/core/app/frontend/app/dist/css/app.csscore/app/frontend/app/dist/app.jscore/app/frontend/app/dist/app.js?ver=core/app/frontend/app/dist/css/app.css?ver=HTML / DOM Fingerprints
wpruby-caa-app