WPMU New Blog Default Role Security & Risk Analysis

wordpress.org/plugins/new-blog-default-user-role

Lets site admins specify what role a user who signs up to a new blog will be given by default.

10 active installs v0.1 PHP + WP 2.8+ Updated Mar 14, 2010
wpmu-users-roles
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPMU New Blog Default Role Safe to Use in 2026?

Generally Safe

Score 85/100

WPMU New Blog Default Role has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The plugin "new-blog-default-user-role" v0.1 presents a generally positive security posture based on the provided static analysis. It boasts a zero-attack surface with no AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, no unprotected entry points. The code also shows good practices regarding SQL queries, all of which are prepared statements, and there are no detected file operations or external HTTP requests. The absence of critical, high, or medium severity taint flows further reinforces this initial impression of security. However, a significant concern arises from the output escaping signal, which indicates that 100% of outputs are not properly escaped. This is a critical vulnerability, as unescaped output can lead to cross-site scripting (XSS) attacks, allowing attackers to inject malicious scripts into web pages viewed by users. The plugin's vulnerability history is clean, with no known CVEs, which is a strength. However, this can sometimes be misleading for very new or obscure plugins, as vulnerabilities may simply not have been discovered or reported yet. In conclusion, while the plugin demonstrates a solid foundation by minimizing its attack surface and employing secure database practices, the complete lack of output escaping is a severe and immediate risk that must be addressed.

Key Concerns

  • 100% of outputs are not properly escaped
Vulnerabilities
None known

WPMU New Blog Default Role Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WPMU New Blog Default Role Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

WPMU New Blog Default Role Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

WPMU New Blog Default Role Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwpmu_activate_blogwpmu-new-blog-default-role.php:73
actionadmin_menuwpmu-new-blog-default-role.php:76
Maintenance & Trust

WPMU New Blog Default Role Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedMar 14, 2010
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Alternatives

WPMU New Blog Default Role Alternatives

No alternatives data available yet.

Developer Profile

WPMU New Blog Default Role Developer Profile

outspaced

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WPMU New Blog Default Role

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<h2>Default role for new blog signups</h2><form action='' method='post' name='form_new_blog_role_option'><select name='new_blog_role_option'><option value='
FAQ

Frequently Asked Questions about WPMU New Blog Default Role