No User Enumeration Security & Risk Analysis

wordpress.org/plugins/no-user-enumeration

Stop user enumeration for security.

200 active installs v1.3.2 PHP + WP 2.9+ Updated Oct 23, 2019
securityuser-enumerationwpscan
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is No User Enumeration Safe to Use in 2026?

Generally Safe

Score 85/100

No User Enumeration has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The 'no-user-enumeration' v1.3.2 plugin demonstrates an excellent security posture based on the provided static analysis. There are no identified attack vectors such as AJAX handlers, REST API routes, shortcodes, or cron events that could be exploited. Furthermore, the code signals show a complete absence of dangerous functions, file operations, and external HTTP requests. All SQL queries utilize prepared statements, and all outputs are properly escaped. The lack of any taint analysis findings or recorded vulnerabilities in its history further reinforces its strong security. This indicates a well-developed and security-conscious plugin that adheres to best practices for WordPress plugin development.

While the plugin's current version appears highly secure, the absence of nonce checks and capability checks on potential entry points (though none were found) is a theoretical concern. If the attack surface were to expand in future versions, these checks would become critical. The lack of vulnerability history is a positive indicator, suggesting consistent security maintenance, but it also means there's less historical data to analyze for common vulnerability patterns. Overall, the plugin is commendably secure, with its primary strength lying in its minimal attack surface and rigorous adherence to secure coding practices.

Key Concerns

  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

No User Enumeration Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

No User Enumeration Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries
Attack Surface

No User Enumeration Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filterthe_authorno-user-enumeration.php:123
filterget_comment_authorno-user-enumeration.php:127
filterauthor_linkno-user-enumeration.php:131
filtercomment_classno-user-enumeration.php:135
filtercomment_reply_linkno-user-enumeration.php:139
filterplugin_action_linksno-user-enumeration.php:175
Maintenance & Trust

No User Enumeration Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedOct 23, 2019
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs200
Developer Profile

No User Enumeration Developer Profile

Carlos

1 plugin · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect No User Enumeration

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
comment-author-
Data Attributes
aria-label=''
REST Endpoints
/wp/v2/users/wp-json/users
FAQ

Frequently Asked Questions about No User Enumeration