WP User Visitors Security & Risk Analysis

wordpress.org/plugins/recent-wp-user-visitors

Under each post or page Its display recent visited user(registered)image and email.

10 active installs v1.0.0 PHP + WP 3.0+ Updated Dec 28, 2014
recent-visited-userrecent-visited-user-imagerecent-visitors-photouser-imagevisitors-image
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP User Visitors Safe to Use in 2026?

Generally Safe

Score 85/100

WP User Visitors has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "recent-wp-user-visitors" plugin v1.0.0 demonstrates a mixed security posture. On the positive side, it has a small attack surface with only one identified entry point (a shortcode) and no registered AJAX handlers or REST API routes that appear to lack authentication. The absence of dangerous functions, file operations, external HTTP requests, and the use of prepared statements for all SQL queries are also good indicators. Furthermore, the plugin has no recorded vulnerability history, suggesting a relatively stable past.

However, significant concerns arise from the lack of output escaping, with 0% of 19 total outputs being properly escaped. This is a critical weakness that can easily lead to Cross-Site Scripting (XSS) vulnerabilities. The absence of nonce checks and capability checks for its single entry point (the shortcode) also means that potentially sensitive actions triggered by the shortcode could be performed by unauthorized users or through Cross-Site Request Forgery (CSRF) attacks, as there are no mechanisms to verify the request's origin or the user's permissions. The plugin's static analysis also shows 0 taint flows, which could be due to the limited scope of the analysis or simply the absence of complex data handling.

In conclusion, while the plugin has a small attack surface and avoids some common pitfalls like raw SQL and dangerous functions, the severe lack of output escaping and the absence of essential security checks like nonces and capability checks for its shortcode represent substantial risks. The plugin's history of no vulnerabilities is positive but does not mitigate the current, evidence-backed security flaws.

Key Concerns

  • Unescaped output (100%)
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP User Visitors Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP User Visitors Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
19
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped19 total outputs
Attack Surface

WP User Visitors Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[rwuv_recent_wp_user_visitor] recent_wp_user_visitor.php:375
WordPress Hooks 4
actionadmin_menurecent_wp_user_visitor.php:17
actionadmin_initrecent_wp_user_visitor.php:25
actionwp_headrecent_wp_user_visitor.php:194
filterthe_contentrecent_wp_user_visitor.php:397
Maintenance & Trust

WP User Visitors Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedDec 28, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP User Visitors Developer Profile

php-developer

3 plugins · 320 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP User Visitors

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP User Visitors