Direct Admin Reseller Connection Security & Risk Analysis

wordpress.org/plugins/direct-admin-reseller-connection

Direct Admin Reseller Connection let's your users manage their Direct Admin account with their Wordpress website profile and login.

10 active installs v0.3.3 PHP + WP 3.5.0+ Updated Mar 24, 2019
directadminresellersettingswebhostingwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Direct Admin Reseller Connection Safe to Use in 2026?

Generally Safe

Score 85/100

Direct Admin Reseller Connection has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "direct-admin-reseller-connection" plugin version 0.3.3 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices in database interaction by exclusively using prepared statements for its SQL queries and avoids external HTTP requests. It also has a limited attack surface, with all identified entry points (shortcodes) being potentially protected by capability checks. The absence of known vulnerabilities and CVEs is also a strong indicator of a generally well-maintained codebase.

However, a significant concern arises from the complete lack of output escaping. With 143 outputs analyzed and 0% properly escaped, this presents a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that originates from user input or external sources could be manipulated to inject malicious scripts, potentially leading to session hijacking, defacement, or further attacks. The absence of nonce checks, while not directly linked to an unprotected attack surface in this specific analysis, is a general weakness in WordPress plugin security, particularly if any AJAX functionality were to be introduced or if capability checks were insufficient.

Given the plugin's clean vulnerability history, it suggests that the developers may be responsive to security issues or that its functionality hasn't historically been a major target for exploitation. Nevertheless, the critical finding of unescaped output is a severe oversight that needs immediate attention. The plugin's strengths lie in its database security and limited attack vectors, but the lack of output escaping significantly undermines its overall security, making XSS a primary and urgent concern.

Key Concerns

  • Unescaped output (143 total, 0% escaped)
  • No nonce checks
Vulnerabilities
None known

Direct Admin Reseller Connection Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Direct Admin Reseller Connection Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
19 prepared
Unescaped Output
143
0 escaped
Nonce Checks
0
Capability Checks
5
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared19 total queries

Output Escaping

0% escaped143 total outputs
Attack Surface

Direct Admin Reseller Connection Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[darc-nh-page-mail] direct-admin-reseller-connection.php:224
[darc-nh-page-domain] direct-admin-reseller-connection.php:225
[darc-nh-page-packages] direct-admin-reseller-connection.php:226
WordPress Hooks 12
actionadmin_initdirect-admin-reseller-connection.php:229
actionadmin_menudirect-admin-reseller-connection.php:230
actionadmin_menudirect-admin-reseller-connection.php:231
actionwp_dashboard_setupdirect-admin-reseller-connection.php:233
actionshow_user_profiledirect-admin-reseller-connection.php:235
actionedit_user_profiledirect-admin-reseller-connection.php:236
actionpersonal_options_updatedirect-admin-reseller-connection.php:237
actionedit_user_profile_updatedirect-admin-reseller-connection.php:238
actionplugins_loadeddirect-admin-reseller-connection.php:240
actionplugins_loadeddirect-admin-reseller-connection.php:241
actionwp_enqueue_scriptsdirect-admin-reseller-connection.php:243
actioninitdirect-admin-reseller-connection.php:245
Maintenance & Trust

Direct Admin Reseller Connection Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedMar 24, 2019
PHP min version
Downloads3K

Community Trust

Rating76/100
Number of ratings4
Active installs10
Developer Profile

Direct Admin Reseller Connection Developer Profile

Aphotrax

3 plugins · 690 total installs

71
trust score
Avg Security Score
67/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Direct Admin Reseller Connection

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/direct-admin-reseller-connection/darc-dashboard.js/wp-content/plugins/direct-admin-reseller-connection/darc-widget.js/wp-content/plugins/direct-admin-reseller-connection/darc-mail.js/wp-content/plugins/direct-admin-reseller-connection/darc-domain.js/wp-content/plugins/direct-admin-reseller-connection/darc-packages.js
Script Paths
/wp-content/plugins/direct-admin-reseller-connection/darc-dashboard.js/wp-content/plugins/direct-admin-reseller-connection/darc-widget.js/wp-content/plugins/direct-admin-reseller-connection/darc-mail.js/wp-content/plugins/direct-admin-reseller-connection/darc-domain.js/wp-content/plugins/direct-admin-reseller-connection/darc-packages.js

HTML / DOM Fingerprints

CSS Classes
wp-darc-set
HTML Comments
<!-- Your code starts here --><!-- Check this field to delete your password form the database. --><!-- Running on the same server? You can use "localhost". Incase of a <b>secure connection:</b><br> ssl://12.34.56.78 or ssl://localhost -->
Data Attributes
darc-settings-pagedarc-settings-page^=#darc-option
JS Globals
DarcHash
FAQ

Frequently Asked Questions about Direct Admin Reseller Connection