Network User Management Security & Risk Analysis

wordpress.org/plugins/network-user-management

Synchronise users and user roles from main Blog, automatically add users to each site in your WordPress network (Multisite).

10 active installs v1.0 PHP + WP 3.0+ Updated Sep 16, 2013
multisiterolesusers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Network User Management Safe to Use in 2026?

Generally Safe

Score 85/100

Network User Management has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "network-user-management" plugin v1.0 exhibits a generally positive security posture with no recorded vulnerabilities and a seemingly small attack surface. The static analysis shows zero AJAX handlers, REST API routes, shortcodes, or cron events, which is a strong indicator of a limited exposure. Furthermore, there are no reported CVEs, indicating a history of good security practices or a lack of discovery, which is encouraging.

However, the code analysis reveals significant concerns that overshadow the positive findings. The plugin uses two SQL queries, and alarmingly, 0% of them utilize prepared statements. This practice, combined with 0% proper output escaping across 11 identified outputs, presents a high risk of SQL injection and Cross-Site Scripting (XSS) vulnerabilities. While taint analysis shows no explicit flows, the raw SQL and unescaped output are direct pathways for such attacks. The presence of nonce checks is a minor positive, but their effectiveness is negated by the lack of capability checks and the other critical code hygiene issues.

In conclusion, while the plugin's history and limited attack surface are strengths, the critical deficiencies in database query security and output sanitization render it highly vulnerable. The absence of capability checks further exacerbates these risks, as any authenticated user could potentially trigger these vulnerabilities. Immediate remediation of SQL query preparation and output escaping is paramount to mitigate severe security risks.

Key Concerns

  • SQL queries not using prepared statements
  • No proper output escaping
  • No capability checks
Vulnerabilities
None known

Network User Management Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Network User Management Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
11
0 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries

Output Escaping

0% escaped11 total outputs
Attack Surface

Network User Management Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionedit_user_profile_updatenetwork-user-management.php:54
actionuser_registernetwork-user-management.php:55
actionwpmu_activate_usernetwork-user-management.php:56
actionwpmu_new_usernetwork-user-management.php:57
actionadmin_enqueue_scriptsnetwork-user-management.php:148
actionnetwork_admin_menunetwork-user-management.php:149
Maintenance & Trust

Network User Management Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedSep 16, 2013
PHP min version
Downloads2K

Community Trust

Rating60/100
Number of ratings2
Active installs10
Developer Profile

Network User Management Developer Profile

Gravuj Miklos Henrich

5 plugins · 150 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Network User Management

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/network-user-management/wpnm.css
Version Parameters
wpnm.css?ver=1.0

HTML / DOM Fingerprints

CSS Classes
button-checkbox
Shortcode Output
<form name="wpnm_form" method="post" action="
FAQ

Frequently Asked Questions about Network User Management