HTAuth Sync Security & Risk Analysis

wordpress.org/plugins/htauth-sync

Synchronize your Wordpress users with a htusers file for authentication outside of Wordpress

10 active installs v1.1 PHP + WP 3.5+ Updated Jan 7, 2014
apacheauthenticationhtaccesshtauthhtdigesthtusers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is HTAuth Sync Safe to Use in 2026?

Generally Safe

Score 85/100

HTAuth Sync has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "htauth-sync" v1.1 plugin presents a mixed security posture. On one hand, the absence of known vulnerabilities (CVEs) and the use of prepared statements for all SQL queries are positive indicators. The plugin also has a seemingly small attack surface with no reported AJAX handlers, REST API routes, shortcodes, or cron events that are accessible externally.

However, significant concerns arise from the static code analysis. The presence of the `unserialize` function is a critical risk, especially without proper input validation or sanitization. Furthermore, 100% of the output is unescaped, making the plugin highly vulnerable to Cross-Site Scripting (XSS) attacks. The taint analysis revealing two flows with unsanitized paths further exacerbates these risks, suggesting that attacker-controlled data could be processed in a dangerous manner.

The lack of any recorded vulnerability history is encouraging but should be viewed cautiously given the evident code weaknesses. The plugin's strengths lie in its SQL practices and limited external entry points, but these are overshadowed by the critical risks associated with unserialization and unescaped output. A balanced conclusion is that while the plugin may not have a history of being exploited, the current code contains fundamental security flaws that require immediate attention.

Key Concerns

  • Unescaped output (100%)
  • Dangerous function: unserialize used
  • Taint flow with unsanitized path (x2)
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

HTAuth Sync Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

HTAuth Sync Release Timeline

v1.1Current
v1.0.0
Code Analysis
Analyzed Mar 17, 2026

HTAuth Sync Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserializeupdate_option(HTDIGESTSYNC_OPTIONS, unserialize(HTDIGESTSYNC_DEFAULT_OPTIONS));htauthsync.php:58
unserialize$defaultOptions = unserialize(HTDIGESTSYNC_DEFAULT_OPTIONS);htauthsync.php:68

Output Escaping

0% escaped7 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
optionsPage (htauthsync.php:354)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

HTAuth Sync Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionedit_user_profile_updatehtauthsync.php:434
actionpersonal_options_updatehtauthsync.php:435
filterwp_authenticate_userhtauthsync.php:436
actionadmin_menuhtauthsync.php:438
Maintenance & Trust

HTAuth Sync Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedJan 7, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

HTAuth Sync Developer Profile

John Luetke

3 plugins · 120 total installs

79
trust score
Avg Security Score
78/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect HTAuth Sync

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
htauth-sync/style.css?ver=htauth-sync/htauth-sync.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- Not Synchronized -->
JS Globals
htauth_sync_ajax_object
FAQ

Frequently Asked Questions about HTAuth Sync