Permanent User Password Security & Risk Analysis

wordpress.org/plugins/permanent-user-password

A light-weight WordPress plugin that empowers administrators to set permanent passwords for users on their websites.

0 active installs v1.0.1 PHP 8.3+ WP 6.0+ Updated Unknown
passwordpermanent-passwordpermanent-user-passwordsecurityuser-management
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Permanent User Password Safe to Use in 2026?

Generally Safe

Score 100/100

Permanent User Password has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "permanent-user-password" plugin v1.0.1 demonstrates a strong security posture based on the provided static analysis. The code shows no dangerous functions, all SQL queries utilize prepared statements, and all output is properly escaped. Furthermore, there are no file operations or external HTTP requests, which significantly reduces the attack surface. The absence of known vulnerabilities and CVEs in its history is also a positive indicator of its current security, suggesting a history of responsible development and maintenance.

However, a key concern arises from the complete lack of nonce checks and capability checks. While the attack surface is currently minimal (0 AJAX, 0 REST API, 0 shortcodes), any future addition of such entry points without proper authentication and authorization mechanisms would introduce significant security risks. The presence of a cron event also warrants attention; its functionality and whether it performs any sensitive operations that might be exploitable without proper checks should be investigated.

In conclusion, the plugin is currently in a good state, with strong coding practices observed in SQL and output handling. The absence of vulnerabilities is reassuring. The primary area for improvement and potential risk lies in the complete reliance on the absence of exposed entry points rather than implementing robust built-in security checks like nonces and capability checks, which would make it more resilient against future development changes or unforeseen attack vectors.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Permanent User Password Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Permanent User Password Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
12 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped12 total outputs
Attack Surface

Permanent User Password Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionshow_user_profilepermanent-user-password.php:90
actionedit_user_profilepermanent-user-password.php:91
actionpersonal_options_updatepermanent-user-password.php:92
actionedit_user_profile_updatepermanent-user-password.php:93
actionprofile_updatepermanent-user-password.php:94
actionpupa_protect_passwordpermanent-user-password.php:95
actionadmin_noticespermanent-user-password.php:276

Scheduled Events 1

pupa_protect_password
Maintenance & Trust

Permanent User Password Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version8.3
Downloads545

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Permanent User Password Developer Profile

Fahid Javid

3 plugins · 2K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
789 days
View full developer profile
Detection Fingerprints

How We Detect Permanent User Password

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="pupa_check"id="pupa_check"name="pupa_password"id="pupa_password"for="pupa_check"for="pupa_password"
FAQ

Frequently Asked Questions about Permanent User Password