
Hetjens Registered Only Security & Risk Analysis
wordpress.org/plugins/hetjens-registered-onlyThis plug-in restricts the access to blog and feed. Visitors need to login before accessing the blog. It offers a private feed for every user.
Is Hetjens Registered Only Safe to Use in 2026?
Generally Safe
Score 85/100Hetjens Registered Only has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The hetjens-registered-only plugin v0.4 exhibits a mixed security posture. On the positive side, it has a minimal attack surface with no detected AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all SQL queries utilize prepared statements, and there are no external HTTP requests or file operations, which are good security practices. The absence of any recorded vulnerabilities in its history is also a strong indicator of its current stability.
However, significant concerns arise from the static analysis. The presence of the `create_function` dangerous function is a notable risk, as it can be exploited for code injection. More critically, the taint analysis reveals two flows with unsanitized paths, flagged as high severity. This indicates that data entering the plugin might not be properly validated or escaped before being used in a sensitive context, potentially leading to cross-site scripting (XSS) or other injection vulnerabilities. The fact that 100% of output is not properly escaped is also a major red flag, directly contributing to XSS risks. The lack of nonce and capability checks on any potential entry points, though currently not exploitable due to zero entry points, suggests a lack of robust authorization and integrity controls that could become a problem if the attack surface expands in future versions.
Key Concerns
- High severity taint flows with unsanitized paths
- All output is unescaped
- Use of dangerous function create_function
- No nonce checks implemented
- No capability checks implemented
Hetjens Registered Only Security Vulnerabilities
Hetjens Registered Only Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Hetjens Registered Only Attack Surface
WordPress Hooks 4
Maintenance & Trust
Hetjens Registered Only Maintenance & Trust
Maintenance Signals
Community Trust
Hetjens Registered Only Alternatives
Advanced Access Manager – Access Governance for WordPress
advanced-access-manager
Access Governance for WordPress. Control roles, users, content, admin areas, and APIs to prevent broken access controls and excessive privileges.
Private Website – Login Required
private-website
This plugin requires users to be logged in to view the website. Activate the plugin to enforce login, and deactivate it to remove the restriction.
Absoluto Access Gate
absoluto-access-gate
Force users to login before viewing pages. Exclude specific pages and allow certain user roles/users to bypass the requirement.
Loginizer
loginizer
Loginizer is a WordPress security plugin which helps you fight against bruteforce attacks.
User Role Editor
user-role-editor
User Role Editor WordPress plugin makes user roles and capabilities changing easy. Edit/add/delete WordPress user roles and capabilities.
Hetjens Registered Only Developer Profile
4 plugins · 40 total installs
How We Detect Hetjens Registered Only
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
hetjens_registered_only_disabledhetjens_registered_only_activehetjens_registered_only_active