
Front End Users Security & Risk Analysis
wordpress.org/plugins/front-end-only-usersA customizable front end user management plugin for membership sites. Use shortcodes for registration, login, restricting access, membership fees, etc
Is Front End Users Safe to Use in 2026?
High Risk
Score 42/100Front End Users carries significant security risk with 13 known CVEs, 2 still unpatched. Consider switching to a maintained alternative.
The 'front-end-only-users' v3.2.35 plugin exhibits a concerning security posture. While it shows strengths in SQL query preparedness and output escaping, these are overshadowed by significant vulnerabilities. The substantial number of unprotected AJAX handlers, coupled with critical taint flows, presents a direct avenue for attackers. Furthermore, the plugin's history of 13 known CVEs, including unpatched critical and high-severity issues, indicates a pattern of recurring security weaknesses.
The code analysis reveals a large attack surface with 10 out of 11 AJAX handlers lacking authentication, and a concerning 26 high-severity taint flows with unsanitized paths. The presence of dangerous functions like 'unserialize' and 'passthru' further amplifies the risk. The vulnerability history, with common types including Missing Authorization and SQL Injection, strongly suggests a lack of robust security practices during development and maintenance.
In conclusion, while some good practices are observed, the plugin's numerous unprotected entry points, critical taint flows, and a history of severe unpatched vulnerabilities make it a high-risk component. Immediate attention is required to address the unpatched CVEs and the identified code weaknesses to mitigate potential security breaches.
Key Concerns
- Unpatched Critical CVE
- Unpatched High Severity CVE
- Critical Taint Flows
- High Severity Taint Flows
- AJAX Handlers without Auth
- Dangerous functions: unserialize, passthru
- Missing Authorization vulnerability history
- Unrestricted Upload vulnerability history
- SQL Injection vulnerability history
- XSS vulnerability history
- CSRF vulnerability history
- Bundled libraries: TinyMCE
Front End Users Security Vulnerabilities
CVEs by Year
Severity Breakdown
13 total CVEs
Front End Users <= 3.2.33 - Missing Authorization
Front End Users <= 3.2.33 - Authenticated (Contributor+) Stored Cross-Site Scripting
Front End Users <= 3.2.32 - Missing Authorization to Information Exposure
Front-End-Only-Users <= 3.2.32 - Unauthenticated Arbitrary File Upload
Front End Users <= 3.2.32 - Authenticated (Admin+) SQL injection
Front End Users <= 3.2.32 - Reflected Cross-Site Scripting
Front End Users <= 3.2.30 - Authenticated (Contributor+) Stored Cross-Site Scripting
Front End Users <= 3.2.30 - Authenticated (Contributor+) Stored Cross-Site Scripting via forgot-password Shortcode
Front End Users <= 3.2.28 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Front End Users <= 3.2.28 - Authenticated (Contributor+) Time-Based SQL Injection
Front End Users <= 3.2.24 - Reflected Cross-Site Scripting
Front End Users <= 3.2.24 - Missing Authorization to Unauthenticated Registered User Deletion
Front End Users <= 3.2.24 - Cross-Site Request Forgery
Front End Users Release Timeline
Front End Users Code Analysis
Dangerous Functions Found
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
Front End Users Attack Surface
AJAX Handlers 11
Shortcodes 15
WordPress Hooks 58
Maintenance & Trust
Front End Users Maintenance & Trust
Maintenance Signals
Community Trust
Front End Users Alternatives
Front End Users Developer Profile
21 plugins · 65K total installs
How We Detect Front End Users
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/front-end-only-users/js/ewd-feup-dashboard-review-ask.js/wp-content/plugins/front-end-only-users/js/ShortcodeHelper.js/wp-content/plugins/front-end-only-users/js/Admin.js/wp-content/plugins/front-end-only-users/js/sorttable.js/wp-content/plugins/front-end-only-users/js/jquery.confirm.min.js/wp-content/plugins/front-end-only-users/js/bootstrap.min.js/wp-content/plugins/front-end-only-users/js/ewd-feup-check-password-strength.js/wp-content/plugins/front-end-only-users/js/spectrum.js/wp-content/plugins/front-end-only-users/js/ewd-feup-dashboard-review-ask.js/wp-content/plugins/front-end-only-users/js/ShortcodeHelper.js/wp-content/plugins/front-end-only-users/js/Admin.js/wp-content/plugins/front-end-only-users/js/sorttable.js/wp-content/plugins/front-end-only-users/js/jquery.confirm.min.js/wp-content/plugins/front-end-only-users/js/bootstrap.min.js+2 morefront-end-only-users/js/ewd-feup-dashboard-review-ask.js?ver=front-end-only-users/js/ShortcodeHelper.js?ver=front-end-only-users/js/Admin.js?ver=front-end-only-users/js/sorttable.js?ver=front-end-only-users/js/jquery.confirm.min.js?ver=front-end-only-users/js/bootstrap.min.js?ver=front-end-only-users/js/ewd-feup-check-password-strength.js?ver=front-end-only-users/js/spectrum.js?ver=HTML / DOM Fingerprints
ewd-feup-dashboard-review-askewd-feup-shortcode-helperewd-feup-admin-jsewd-feup-check-password-strengthewd-feup-actionewd_feup_review_askewd_feup_feup_field_dataewd_feup_ajax_translations