
Partners Security & Risk Analysis
wordpress.org/plugins/partnersCreates a fenced membership area with private content.
Is Partners Safe to Use in 2026?
High Risk
Score 38/100Partners carries significant security risk with 2 known CVEs, 2 still unpatched. Consider switching to a maintained alternative.
The "partners" plugin version 0.2.0 presents a concerning security posture, despite some positive indicators. While the attack surface is seemingly controlled with no unprotected entry points and a majority of SQL queries using prepared statements, significant risks are revealed through code signals and vulnerability history. The presence of the `unserialize` function, a known vector for deserialization vulnerabilities, coupled with a high number of flows with unsanitized paths and two high-severity taint flows, indicates a potential for serious security breaches. Furthermore, the plugin has a history of critical vulnerabilities, including Cross-site Scripting and Deserialization of Untrusted Data, with two unpatched CVEs, one of which is critical. This pattern suggests recurring security weaknesses that have not been adequately addressed, making it a high-risk plugin.
While the plugin demonstrates some good practices like non-trivial capability checks and nonce checks, these are overshadowed by critical flaws. The low percentage of properly escaped output is another major red flag, increasing the likelihood of Cross-site Scripting attacks. The file operation and external HTTP requests being zero are positive, but do not mitigate the core dangers. In conclusion, the "partners" plugin version 0.2.0 is not recommended for use in a production environment due to its critical vulnerability history, exploitable code signals like unserialize, and a high number of unsanitized taint flows.
Key Concerns
- Unpatched critical CVE
- Unpatched medium CVE
- High severity taint flows
- Dangerous function: unserialize
- Low percentage of output escaping
- Flows with unsanitized paths
Partners Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
Partners <= 0.2.0 - Reflected Cross-Site Scripting
Partners <= 0.2.0 - Unauthenticated PHP Object Injection
Partners Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Partners Attack Surface
Shortcodes 9
WordPress Hooks 25
Maintenance & Trust
Partners Maintenance & Trust
Maintenance Signals
Community Trust
Partners Alternatives
BuddyPress Members Only
buddypress-members-only
BuddyPress Members Only restricts Your Buddypress and Wordpress to logged in/registered members.
ExpressTechSoftwares Addon for MemberPress and Discord
expresstechsoftwares-memberpress-discord-add-on
This add-on enables connecting your MemberPress enabled website to your discord server. Now you can add/remove MemberPress members directly to your di …
Private Area for WordPress
wp-private-area
Private Area allows you to create restricted sections of your website that only logged users can access, and that are completely invisible to search e …
WP-BusinessDirectory – Business directory plugin for WordPress
wp-businessdirectory
WP-BusinessDirectory is not just a simple business directory plugin, it is the most advanced business directory, classified ads directory, job listing …
BP Custom Functionalities
bp-custom-functionalities
BP Custom Functionalities provides custom functionalities that regular BuddyPress users requires.
Partners Developer Profile
2 plugins · 2K total installs
How We Detect Partners
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/partners/css/main.css/wp-content/plugins/partners/js/main.js/wp-content/plugins/partners/js/main.jspartners/css/main.css?ver=partners/js/main.js?ver=HTML / DOM Fingerprints
wp-list-tablemembers-table-actions<!-- wp_list_table --><!-- http://plugins.svn.wordpress.org/custom-list-table-example/trunk/list-table-example.php --><!-- Members --><!-- Edit Approved Email -->+6 moreid="partners-table"name="mdpartners_approved_email_nonce"name="mdpartners_denied_email_nonce"[partners_login_form][partners_registration_form][partners_forgot_password_form][partners_reset_password_form]