Require First and Last Name Security & Risk Analysis

wordpress.org/plugins/require-first-and-last-name

Require first and last name from users who are editing their profiles.

10 active installs v1.2 PHP + WP 3.0+ Updated Dec 29, 2011
nameprofileuiuserusers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Require First and Last Name Safe to Use in 2026?

Generally Safe

Score 85/100

Require First and Last Name has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "require-first-and-last-name" v1.2 plugin exhibits a generally positive security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface. Furthermore, the code analysis reveals no dangerous function usage, no file operations, no external HTTP requests, and a complete absence of taint analysis findings, indicating a clean codebase in these critical areas.

However, a notable concern arises from the "Output escaping" signal, which indicates that 100% of outputs are not properly escaped. This represents a potential cross-site scripting (XSS) vulnerability, as user-supplied data or plugin-generated content could be rendered directly in the browser without sanitization, allowing for malicious script injection. The lack of any capability checks or nonce checks, while not directly creating an immediate threat given the limited attack surface, does mean that any future expansion of the plugin's functionality could inherit these weaknesses without proper security considerations.

The vulnerability history is completely clean, with no known CVEs. This, combined with the static analysis findings, suggests that the developers have a good understanding of secure coding practices, with the exception of output escaping. The overall security posture is strong due to the minimal attack surface and absence of critical code-level vulnerabilities, but the unescaped output presents a clear and addressable risk.

Key Concerns

  • 100% of outputs not properly escaped
Vulnerabilities
None known

Require First and Last Name Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Require First and Last Name Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Require First and Last Name Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filteruser_profile_update_errorsrequire-first-and-last-name.php:14
actionpersonal_optionsrequire-first-and-last-name.php:22
Maintenance & Trust

Require First and Last Name Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedDec 29, 2011
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Require First and Last Name Developer Profile

mitcho (Michael Yoshitaka Erlewine)

13 plugins · 6K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Require First and Last Name

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
description
Data Attributes
required
FAQ

Frequently Asked Questions about Require First and Last Name