Network Restricted Members Security & Risk Analysis

wordpress.org/plugins/network-restricted-members

Restrict user access to selected sites on open multisite networks.

10 active installs v0.3.1 PHP + WP 4.0+ Updated Feb 14, 2016
access-controlmembershipmultisitenetworkuser-management
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Network Restricted Members Safe to Use in 2026?

Generally Safe

Score 85/100

Network Restricted Members has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The static analysis of the "network-restricted-members" plugin v0.3.1 reveals a generally good security posture. There are no identified dangerous functions, all SQL queries utilize prepared statements, and all identified output is properly escaped. Furthermore, the plugin has no recorded vulnerabilities or CVEs, indicating a clean security history. However, the complete absence of nonces, capability checks, and the lack of any identified entry points (AJAX, REST API, shortcodes, cron) is concerning. While it suggests a minimal attack surface, it also implies that the plugin might not have any interactive features that would typically require these security measures. This could mean the plugin is either very basic or its functionality is not being fully captured by the static analysis. The total lack of identified taint flows also suggests limited data processing that could be vulnerable. Overall, the plugin exhibits good coding practices for the elements analyzed, but the minimal feature set and lack of security checks for potential interactive elements warrant a cautious approach, as the analysis might not fully represent the plugin's complete functionality.

Key Concerns

  • No nonce checks identified
  • No capability checks identified
  • No AJAX handlers
  • No REST API routes
  • No shortcodes
  • No cron events
Vulnerabilities
None known

Network Restricted Members Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Network Restricted Members Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

Network Restricted Members Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionwpmu_optionsnetwork-restricted-members.php:46
actionupdate_wpmu_optionsnetwork-restricted-members.php:47
actionuser_registernetwork-restricted-members.php:52
actionshow_user_profilenetwork-restricted-members.php:57
actionedit_user_profilenetwork-restricted-members.php:58
actionpersonal_options_updatenetwork-restricted-members.php:59
actionedit_user_profile_updatenetwork-restricted-members.php:60
actiontemplate_redirectnetwork-restricted-members.php:65
actionbp_screensnetwork-restricted-members.php:66
actionplugins_loadednetwork-restricted-members.php:287
Maintenance & Trust

Network Restricted Members Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedFeb 14, 2016
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Network Restricted Members Developer Profile

Luis Rodrigues

3 plugins · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Network Restricted Members

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="network_restricted"id="network_restricted"name="network_restricted_members_new_users"id="network_restricted_members_new_users"
FAQ

Frequently Asked Questions about Network Restricted Members