Controlled Admin Access Security & Risk Analysis

wordpress.org/plugins/controlled-admin-access

Give a temporarily limited admin access to themes designers, plugins developers and support agents.

10K active installs v2.1.2 PHP 7.0+ WP 4.0+ Updated Dec 8, 2025
accessaccess-managercapabilityroleuser
96
A · Safe
CVEs total2
Unpatched0
Last CVEMar 30, 2021
Safety Verdict

Is Controlled Admin Access Safe to Use in 2026?

Generally Safe

Score 96/100

Controlled Admin Access has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Mar 30, 2021Updated 3mo ago
Risk Assessment

The "controlled-admin-access" plugin version 2.1.2 exhibits a mixed security posture. On the positive side, the static analysis reveals no immediate exploitable attack surface (AJAX, REST API, shortcodes, cron), no dangerous functions are used, all SQL queries are prepared, and there's a single file operation with a nonce check present. This suggests a good understanding of fundamental WordPress security practices in these areas. However, a significant concern arises from the plugin's vulnerability history. It has a history of two critical vulnerabilities, both related to improper access control, with the last one reported in March 2021 and currently patched. This pattern of critical vulnerabilities, even if patched, indicates potential underlying architectural weaknesses that could be re-exploited or manifest in future versions if not thoroughly addressed.

While the current static analysis shows no unsanitized paths in taint flows and a reasonable rate of output escaping, the historical critical vulnerabilities, particularly in access control, cannot be ignored. The absence of critical findings in the current static analysis might be due to the specific version tested or that the previous vulnerabilities were indeed fixed. However, the previous critical issues and the fact that a significant portion of outputs are not properly escaped (68% proper escaping means 32% potentially unescaped) present a tangible risk. The presence of file operations without clear context on their sanitization also warrants caution. Therefore, while the immediate code analysis shows some strengths, the historical critical vulnerabilities and the unescaped output present a notable risk that requires careful consideration and further investigation.

Key Concerns

  • Previous critical vulnerabilities, even if patched
  • Significant portion of outputs not properly escaped
  • File operations present, context of sanitization unclear
Vulnerabilities
2

Controlled Admin Access Security Vulnerabilities

CVEs by Year

2 CVEs in 2021
2021
Patched Has unpatched

Severity Breakdown

Critical
2

2 total CVEs

CVE-2021-4360critical · 9.9Improper Access Control

Controlled Admin Access < 1.5.6 - Privilege Escalation

Mar 30, 2021 Patched in 1.5.6 (1029d)
CVE-2021-24215critical · 9.8Improper Access Control

Controlled Admin Access <= 1.5.1 - Improper Access Control & Privilege Escalation

Mar 23, 2021 Patched in 1.5.2 (1036d)
Code Analysis
Analyzed Mar 16, 2026

Controlled Admin Access Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
32 escaped
Nonce Checks
1
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

68% escaped47 total outputs
Attack Surface

Controlled Admin Access Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 19
actionadmin_menucore\app\frontend\class-app-page.php:25
actionadmin_enqueue_scriptscore\app\frontend\class-app-page.php:26
actionadmin_initcore\class-core.php:40
actionadmin_initcore\class-core.php:41
actionwp_logincore\features\class-login-controller.php:22
actionwp_logincore\features\class-login-controller.php:23
actionlogin_messagecore\features\class-login-controller.php:24
actionclear_auth_cookiecore\features\class-login-controller.php:25
actionadmin_initcore\features\class-login-controller.php:26
filterlogin_redirectcore\features\class-login-controller.php:27
actioncurrent_screencore\features\class-menu-blocker.php:23
filterparent_filecore\features\class-menu-filter.php:22
filteradmin_headcore\features\class-menu-filter.php:23
filterwp_headcore\features\class-menu-filter.php:24
filteruser_row_actionscore\features\class-utilities-filter.php:24
actionadmin_initcore\features\class-utilities-filter.php:26
actionusers_list_table_query_argscore\features\class-utilities-filter.php:28
filterall_pluginscore\features\class-utilities-filter.php:30
actionadmin_initcore\features\class-utilities-filter.php:32
Maintenance & Trust

Controlled Admin Access Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 8, 2025
PHP min version7.0
Downloads218K

Community Trust

Rating96/100
Number of ratings44
Active installs10K
Developer Profile

Controlled Admin Access Developer Profile

Waseem Senjer

10 plugins · 27K total installs

77
trust score
Avg Security Score
97/100
Avg Patch Time
784 days
View full developer profile
Detection Fingerprints

How We Detect Controlled Admin Access

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/controlled-admin-access/core/app/frontend/app/dist/app.js/wp-content/plugins/controlled-admin-access/core/app/frontend/app/dist/css/app.css
Script Paths
core/app/frontend/app/dist/app.js
Version Parameters
core/app/frontend/app/dist/app.js?ver=core/app/frontend/app/dist/css/app.css?ver=

HTML / DOM Fingerprints

CSS Classes
wpruby-caa-app
FAQ

Frequently Asked Questions about Controlled Admin Access