KGR User Log Security & Risk Analysis

wordpress.org/plugins/kgr-user-log

Displays the registration time and the last active time in two custom columns in the users table.

0 active installs v1.6.3 PHP 7.0+ WP 5.3.0+ Updated Nov 18, 2024
last-active-timeregistered-time
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is KGR User Log Safe to Use in 2026?

Generally Safe

Score 92/100

KGR User Log has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "kgr-user-log" v1.6.3 plugin exhibits a strong security posture based on the provided static analysis data. There are no identified dangerous functions, SQL queries are all prepared, and all output is properly escaped. Furthermore, the plugin does not perform file operations or external HTTP requests, significantly reducing its attack surface. The absence of any recorded vulnerabilities, historical or recent, further reinforces its current security standing.

However, the static analysis also highlights a critical lack of security checks, particularly concerning nonce checks and capability checks. With zero AJAX handlers, REST API routes, shortcodes, or cron events, the plugin has a seemingly minimal attack surface. Yet, the complete absence of nonce checks (0 total) on any potential entry points is a significant concern. While there is one capability check, its presence alone doesn't mitigate the risk if the entry points are not properly secured or if the capability check itself is insufficient.

In conclusion, while the code itself appears clean with no overt signs of dangerous practices or known vulnerabilities, the lack of fundamental security mechanisms like nonce checks on potential (even if currently none) entry points presents a latent risk. The plugin's strength lies in its minimal attack surface and adherence to good coding practices for queries and output. Its weakness lies in the complete absence of protective measures like nonce checks, which could be exploited if new entry points are introduced or if existing ones become exposed in future updates. The vulnerability history is excellent, but this does not excuse the absence of basic security layers.

Key Concerns

  • Missing nonce checks on entry points
  • Only one capability check present
Vulnerabilities
None known

KGR User Log Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

KGR User Log Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

KGR User Log Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
filtermanage_users_columnscolumn.php:9
actionmanage_users_custom_columncolumn.php:18
actionadmin_enqueue_scriptscolumn.php:44
filtermanage_users_sortable_columnscolumn.php:53
actionpre_get_userscolumn.php:62
actioninitindex.php:47
actioninitindex.php:67
actionuser_registerindex.php:77
Maintenance & Trust

KGR User Log Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 18, 2024
PHP min version7.0
Downloads936

Community Trust

Rating0/100
Number of ratings0
Active installs0
Alternatives

KGR User Log Alternatives

No alternatives data available yet.

Developer Profile

KGR User Log Developer Profile

Konstantinos Raktivan

4 plugins · 60 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect KGR User Log

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/kgr-user-log/column.css
Version Parameters
kgr-user-log/column.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about KGR User Log