Random User IDs Security & Risk Analysis

wordpress.org/plugins/random-user-ids

This WordPress plugin randomizes the user_id for the user created on WordPress setup, removing one potential attack factor from the site.

300 active installs v20201115.1 PHP + WP 3.1+ Updated Mar 22, 2026
securityuser-ids
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Random User IDs Safe to Use in 2026?

Generally Safe

Score 100/100

Random User IDs has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The 'random-user-ids' plugin v20201115.1 demonstrates a generally positive security posture based on the provided static analysis. The absence of any reported CVEs, combined with a clean taint analysis and no direct SQL queries or dangerous function calls, suggests a well-written and secure codebase. The plugin also doesn't appear to introduce significant attack vectors through AJAX, REST API, shortcodes, or cron events, as all entry points are either absent or have no reported authentication checks, which is a concern for potential future additions but not a current issue. The lack of explicit nonce and capability checks is notable, especially since there are no reported entry points requiring them, but this could be a vulnerability if functionality is added without these protections. The primary concern lies in the complete lack of output escaping, meaning any data output by the plugin could be susceptible to cross-site scripting (XSS) attacks if that data is user-controllable or derived from external sources without sanitization prior to being displayed. While the plugin has no known vulnerabilities and a seemingly small attack surface, the unescaped output represents a potential weakness that should be addressed.

Key Concerns

  • All outputs are unescaped
Vulnerabilities
None known

Random User IDs Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Random User IDs Release Timeline

v20201115.1Current
v20201115
v20190125
v20170720
v20170526.1
v20170526
v20170524
v20170521
Code Analysis
Analyzed Mar 16, 2026

Random User IDs Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Random User IDs Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterwp_pre_insert_user_datadfx-random-user-id.php:66
actionadmin_noticesdfx-random-user-id.php:149
actionadmin_initdfx-random-user-id.php:166
actionplugins_loadeddfx-random-user-id.php:173
Maintenance & Trust

Random User IDs Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 22, 2026
PHP min version
Downloads7K

Community Trust

Rating80/100
Number of ratings5
Active installs300
Developer Profile

Random User IDs Developer Profile

David Marín Carreño

2 plugins · 700 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Random User IDs

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/random-user-ids/

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Random User IDs