Rename Users Security & Risk Analysis

wordpress.org/plugins/rename-users

This plugins allows administrators to rename wordpress usernames.

100 active installs v1.2 PHP + WP 3.0+ Updated Mar 18, 2016
loginrenameuser
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Rename Users Safe to Use in 2026?

Generally Safe

Score 85/100

Rename Users has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "rename-users" plugin v1.2 exhibits a generally strong security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface, and importantly, all identified entry points appear to be protected. The plugin also demonstrates good practices by utilizing prepared statements for all its SQL queries, mitigating the risk of SQL injection vulnerabilities. Furthermore, the presence of a nonce check is a positive indicator of security awareness.

However, there are areas for improvement. The fact that only 50% of output is properly escaped raises a concern for potential cross-site scripting (XSS) vulnerabilities. While the taint analysis did not reveal any unsanitized paths, this is a notable weakness that requires attention. The complete lack of capability checks for any of its functions is a significant security gap. Although no direct entry points were found to be unprotected in the static analysis, this absence of capability checks means that even if an entry point were to be discovered or added in a future version, there's no built-in authorization mechanism to prevent unauthorized access or actions.

The plugin's vulnerability history is clean, with no known CVEs. This, combined with the limited attack surface and use of prepared statements, paints a picture of a plugin that has been developed with some security considerations. Nevertheless, the unaddressed potential for XSS due to partial output escaping and the fundamental absence of capability checks represent tangible risks that could be exploited, especially if the plugin's functionality evolves or if new attack vectors are discovered.

Key Concerns

  • Partial output escaping
  • No capability checks found
Vulnerabilities
None known

Rename Users Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Rename Users Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
1
1 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

50% escaped2 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
renameusers_load_user (renameusers.php:74)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Rename Users Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitrenameusers.php:18
actionadmin_menurenameusers.php:25
Maintenance & Trust

Rename Users Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedMar 18, 2016
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings3
Active installs100
Developer Profile

Rename Users Developer Profile

quan_flo

5 plugins · 290 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Rename Users

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Rename Users