
Expire Users Security & Risk Analysis
wordpress.org/plugins/expire-usersSet expiry dates for user logins.
Is Expire Users Safe to Use in 2026?
Generally Safe
Score 100/100Expire Users has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "expire-users" plugin v1.2.2 exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, file operations, and external HTTP requests, coupled with a commendable 100% of SQL queries using prepared statements, indicates good development practices regarding core security vulnerabilities. Furthermore, the presence of nonce checks and capability checks on entry points, alongside a lack of critical or high-severity taint analysis findings, suggests a well-sanitized codebase. The plugin's vulnerability history is also clear, with no known CVEs, which is a positive indicator of its stability and security over time.
However, the analysis does highlight a minor area for improvement: output escaping. With 79% of outputs properly escaped, there's a small percentage (21%) that remains unescaped. While not a critical flaw, this could potentially lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is handled improperly in those specific instances. The attack surface, while small and reported as entirely protected, consists of two shortcodes, which are often areas where improper input handling can occur. Despite this minor concern, the plugin's overall security is robust, with a strong emphasis on preventing common and severe attack vectors.
Key Concerns
- Outputs not properly escaped
Expire Users Security Vulnerabilities
Expire Users Code Analysis
Output Escaping
Expire Users Attack Surface
Shortcodes 2
WordPress Hooks 42
Scheduled Events 1
Maintenance & Trust
Expire Users Maintenance & Trust
Maintenance Signals
Community Trust
Expire Users Alternatives
Expire User Passwords
expire-user-passwords
Require certain users to change their passwords on a regular basis.
Magic Login Mail or QR Code
magic-login-mail
Enter your email address, and send you an email with a magic link or QR Code to login without a password.
Simple Require Login
simple-require-login
Require login for content on a per page/post/custom post type basis. You can also select a specific role required to view the content.
Skeleton Key
skeleton-key
Gives administrators a skeleton key (their own password) to login as any user they'd like.
SafeTemp Login – Temporary Access with Approval
safetemplogin-tawa
Create temporary users with any role. When a temporary user is an administrator, sensitive actions require approval from a real administrator.
Expire Users Developer Profile
16 plugins · 21K total installs
How We Detect Expire Users
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/expire-users/admin/css/expire-user.css/wp-content/plugins/expire-users/admin/js/expire-user.jsexpire-users/admin/css/expire-user.css?ver=expire-users/admin/js/expire-user.js?ver=HTML / DOM Fingerprints
expire-user-expiredsubmitexpire<!-- @todo Options Page --><!-- @todo Cron job --><!-- @todo Add expired users view --><!-- @todo Add expiring soon view -->+1 moredata-expire-user-idexpire_users