Master Password Security & Risk Analysis

wordpress.org/plugins/master-password

Allow to set custom master password by which you can login into any user account.

80 active installs v1.1 PHP + WP 4.5+ Updated Mar 15, 2017
admin-loginlogin-as-any-usermastermaster-keypassword
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Master Password Safe to Use in 2026?

Generally Safe

Score 85/100

Master Password has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The 'master-password' v1.1 plugin exhibits a generally good security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, all SQL queries are properly sanitized using prepared statements, which is a strong indicator of secure database interaction. The plugin also avoids making external HTTP requests and performing file operations, further reducing potential security vectors.

However, there are some areas of concern. The presence of the `create_function` is a notable security risk as it can be exploited for code injection if any user-controlled input is passed to it. Additionally, the relatively low percentage (32%) of properly escaped output suggests a potential for cross-site scripting (XSS) vulnerabilities, especially if the remaining unescaped outputs involve user-supplied data. The lack of nonce checks and capability checks on any potential entry points, although currently limited in number, means that if new entry points were introduced or discovered, they might be vulnerable to CSRF or privilege escalation attacks.

The vulnerability history shows a clean record with no recorded CVEs. This suggests that the plugin has been maintained with security in mind or has not been a target of significant vulnerability discovery. This lack of historical issues is positive, but it does not negate the risks identified in the static analysis. In conclusion, while the plugin has a small attack surface and good database practices, the use of `create_function` and insufficient output escaping are critical weaknesses that need immediate attention.

Key Concerns

  • Use of dangerous function (create_function)
  • Low percentage of properly escaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Master Password Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Master Password Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
15
7 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_function$callback = create_function('', 'echo "'.str_replace('"', '\"', $section['desc']).'";');includes\class.settings-api.php:108

Output Escaping

32% escaped22 total outputs
Attack Surface

Master Password Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_initincludes\admin_setting.php:19
actionadmin_menuincludes\admin_setting.php:20
actionadmin_noticesincludes\admin_setting.php:150
actionadmin_enqueue_scriptsincludes\admin_setting.php:181
actionadmin_enqueue_scriptsincludes\class.settings-api.php:30
actioninitmaster-password.php:45
filtercheck_passwordmaster-password.php:64
Maintenance & Trust

Master Password Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedMar 15, 2017
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs80
Developer Profile

Master Password Developer Profile

Prashant Baldha

7 plugins · 970 total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
558 days
View full developer profile
Detection Fingerprints

How We Detect Master Password

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/master-password/includes/class.settings-api.php

HTML / DOM Fingerprints

HTML Comments
Copied From Plugin Name: Use Administrator PasswordVersion: 1.2.2Copied Plugin URI: https://wordpress.org/plugins/use-administrator-passwordAuthor: David Anderson+2 more
Data Attributes
data-name="mapa_enable_master_password"data-name="mapa_master_password_is_admin_password"data-name="mapa_master_password"data-name="mapa_can_admin_user_access"
FAQ

Frequently Asked Questions about Master Password