Resource Library for Logged In Users Security & Risk Analysis

wordpress.org/plugins/doubledome-resource-link-library

This Resource Library, Link Library, PDF Library, Document Library, and Video Library plugin enables admins to organize and store categorized resource …

40 active installs v1.6 PHP + WP 5.4+ Updated Dec 17, 2025
link-management-wordpressresource-library-pluginresource-link-libraryresources-link-managementwordpress-link-library
99
A · Safe
CVEs total1
Unpatched0
Last CVEDec 11, 2025
Download
Safety Verdict

Is Resource Library for Logged In Users Safe to Use in 2026?

Generally Safe

Score 99/100

Resource Library for Logged In Users has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Dec 11, 2025Updated 3mo ago
Risk Assessment

The doubledome-resource-link-library v1.6 plugin exhibits a mixed security posture. On the positive side, the static analysis shows a clean attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected. This indicates a good defensive design against common entry point exploitation. Furthermore, the plugin demonstrates awareness of security best practices by implementing a decent number of nonce and capability checks. However, there are areas for improvement. A significant concern is the relatively low percentage of SQL queries that use prepared statements, with 41% being potentially vulnerable to SQL injection if user input is not meticulously handled. Similarly, the output escaping is only properly implemented in 63% of cases, leaving room for cross-site scripting (XSS) vulnerabilities if dynamically generated content is not sanitized. The taint analysis revealed one flow with an unsanitized path, which, while not classified as critical or high, warrants attention as it represents a potential avenue for data leakage or manipulation. The vulnerability history notes one medium-severity CVE, which, although patched, highlights that the plugin has had past security weaknesses. The prevalence of Cross-Site Request Forgery (CSRF) in its history suggests a potential recurring pattern if input validation and nonce usage are not consistently robust across all functionalities. In conclusion, while the plugin has a strong foundation in limiting its attack surface, the code quality in terms of SQL prepared statements and output escaping, along with a past medium vulnerability, indicates a moderate risk profile.

Key Concerns

  • SQL queries not using prepared statements
  • Output escaping not properly implemented
  • Taint flow with unsanitized path
  • Past medium severity CVE
Vulnerabilities
1

Resource Library for Logged In Users Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-14354medium · 4.3Cross-Site Request Forgery (CSRF)

Resource Library for Logged In Users <= 1.5 - Cross-Site Request Forgery to Multiple Administrative Actions

Dec 11, 2025 Patched in 1.6 (26d)
Code Analysis
Analyzed Mar 16, 2026

Resource Library for Logged In Users Code Analysis

Dangerous Functions
0
Raw SQL Queries
14
20 prepared
Unescaped Output
71
119 escaped
Nonce Checks
6
Capability Checks
11
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Select2

SQL Query Safety

59% prepared34 total queries

Output Escaping

63% escaped190 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

8 flows1 with unsanitized paths
category_search_top (includes\class-ddrll.php:516)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Resource Library for Logged In Users Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuincludes\class-ddrll.php:7
actionadmin_enqueue_scriptsincludes\class-ddrll.php:8
Maintenance & Trust

Resource Library for Logged In Users Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 17, 2025
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Alternatives

Resource Library for Logged In Users Alternatives

No alternatives data available yet.

Developer Profile

Resource Library for Logged In Users Developer Profile

doubledome

6 plugins · 620 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
26 days
View full developer profile
Detection Fingerprints

How We Detect Resource Library for Logged In Users

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/doubledome-resource-link-library/assets/admin_settings.css/wp-content/plugins/doubledome-resource-link-library/assets/select2.min.css/wp-content/plugins/doubledome-resource-link-library/assets/select2.min.js
Script Paths
/wp-content/plugins/doubledome-resource-link-library/assets/select2.min.js
Version Parameters
/wp-content/plugins/doubledome-resource-link-library/assets/admin_settings.css?ver=/wp-content/plugins/doubledome-resource-link-library/assets/select2.min.css?ver=/wp-content/plugins/doubledome-resource-link-library/assets/select2.min.js?ver=

HTML / DOM Fingerprints

CSS Classes
ddrll_box
FAQ

Frequently Asked Questions about Resource Library for Logged In Users