Random User IDs Security & Risk Analysis

wordpress.org/plugins/random-user-ids

This WordPress plugin randomizes the user_id for the user created on WordPress setup, removing one potential attack factor from the site.

300 active installs v20201115.1 PHP + WP 3.1+ Updated Jan 27, 2025
securityuser-ids
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Random User IDs Safe to Use in 2026?

Generally Safe

Score 92/100

Random User IDs has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The 'random-user-ids' plugin v20201115.1 demonstrates a generally positive security posture based on the provided static analysis. The absence of any reported CVEs, combined with a clean taint analysis and no direct SQL queries or dangerous function calls, suggests a well-written and secure codebase. The plugin also doesn't appear to introduce significant attack vectors through AJAX, REST API, shortcodes, or cron events, as all entry points are either absent or have no reported authentication checks, which is a concern for potential future additions but not a current issue. The lack of explicit nonce and capability checks is notable, especially since there are no reported entry points requiring them, but this could be a vulnerability if functionality is added without these protections. The primary concern lies in the complete lack of output escaping, meaning any data output by the plugin could be susceptible to cross-site scripting (XSS) attacks if that data is user-controllable or derived from external sources without sanitization prior to being displayed. While the plugin has no known vulnerabilities and a seemingly small attack surface, the unescaped output represents a potential weakness that should be addressed.

Key Concerns

  • All outputs are unescaped
Vulnerabilities
None known

Random User IDs Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Random User IDs Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Random User IDs Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterwp_pre_insert_user_datadfx-random-user-id.php:66
actionadmin_noticesdfx-random-user-id.php:149
actionadmin_initdfx-random-user-id.php:166
actionplugins_loadeddfx-random-user-id.php:173
Maintenance & Trust

Random User IDs Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.0
Last updatedJan 27, 2025
PHP min version
Downloads7K

Community Trust

Rating80/100
Number of ratings5
Active installs300
Developer Profile

Random User IDs Developer Profile

David Marín Carreño

2 plugins · 700 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Random User IDs

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/random-user-ids/

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Random User IDs