
Restrict – membership, site, content and user access restrictions for WordPress Security & Risk Analysis
wordpress.org/plugins/restricted-contentRestrict content easily to logged in users, members with a specific role or user capability, to it's author, Tickera, Easy Digital Downloads or W …
Is Restrict – membership, site, content and user access restrictions for WordPress Safe to Use in 2026?
Generally Safe
Score 99/100Restrict – membership, site, content and user access restrictions for WordPress has a strong security track record. Known vulnerabilities have been patched promptly.
The 'restricted-content' plugin version 2.3.4 exhibits a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries and performing capability checks on a significant number of entry points. The absence of raw SQL, file operations, and external HTTP requests is also commendable, contributing to a reduced attack surface in those areas. Furthermore, the static analysis shows no critical or high-severity taint flows, indicating that user input is generally handled with care.
However, the presence of the `unserialize` function is a notable concern, as it can lead to Remote Code Execution vulnerabilities if not handled with extreme caution and strict input validation, which is not explicitly detailed as sanitized in the static analysis. While the plugin has a single shortcode, which is the only entry point identified, and it has a nonce check and capability checks, the potential risk associated with `unserialize` should not be underestimated. The vulnerability history reveals two past medium-severity CVEs, one related to information exposure and another to Cross-site Scripting. Although there are currently no unpatched vulnerabilities, the recurring types suggest a historical weakness in input sanitization or output escaping for specific scenarios.
In conclusion, while the plugin has made strides in secure coding practices, particularly with database interactions and general capability enforcement, the lingering threat from the `unserialize` function and the historical pattern of XSS and information exposure vulnerabilities warrant vigilance. The plugin's strengths lie in its adherence to prepared statements and capability checks, but its weaknesses are concentrated in the potential for deserialization vulnerabilities and the need for continued scrutiny of its sanitization and escaping logic, especially considering past CVEs.
Key Concerns
- Use of unserialize function detected
- Bundled library Freemius v1.0 outdated (potential)
- Past CVEs indicate historical sanitization/escaping issues
Restrict – membership, site, content and user access restrictions for WordPress Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
Restrict – membership, site, content and user access restrictions for WordPress <= 2.2.8 - Unauthenticated Content Restriction Bypass to Sensitive Information Exposure
Restrict <= 2.2.4 - Reflected Cross-Site Scripting
Restrict – membership, site, content and user access restrictions for WordPress Code Analysis
Dangerous Functions Found
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
Restrict – membership, site, content and user access restrictions for WordPress Attack Surface
Shortcodes 1
WordPress Hooks 23
Maintenance & Trust
Restrict – membership, site, content and user access restrictions for WordPress Maintenance & Trust
Maintenance Signals
Community Trust
Restrict – membership, site, content and user access restrictions for WordPress Alternatives
Page and Post Restriction
page-and-post-restriction
Restrict content access for WordPress (WP) | Restrict pages/posts in WP based on user roles and login status to protect content
Password Protected — Lock Entire Site, Pages, Posts, Categories, and Partial Content
password-protected
Protect your WordPress site, pages, posts, WooCommerce products, and categories with single or multiple passwords.
Advanced Access Manager – Access Governance for WordPress
advanced-access-manager
Access Governance for WordPress. Control roles, users, content, admin areas, and APIs to prevent broken access controls and excessive privileges.
PPWP – Password Protect Pages
password-protect-page
Password protect WordPress pages and posts by user roles or with multiple passwords; protect your entire website with a single password.
Visibility Logic for Elementor
visibility-logic-elementor
Conditional visibility for Elementor — show or hide widgets based on user role, ACF fields, device type, date & time, browser and more.
Restrict – membership, site, content and user access restrictions for WordPress Developer Profile
2 plugins · 5K total installs
How We Detect Restrict – membership, site, content and user access restrictions for WordPress
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/restricted-content/assets/css/admin.css/wp-content/plugins/restricted-content/assets/css/style.css/wp-content/plugins/restricted-content/assets/js/admin.js/wp-content/plugins/restricted-content/assets/js/frontend.js/wp-content/plugins/restricted-content/assets/js/admin.js/wp-content/plugins/restricted-content/assets/js/frontend.jsrestricted-content/assets/css/admin.css?ver=restricted-content/assets/css/style.css?ver=restricted-content/assets/js/admin.js?ver=restricted-content/assets/js/frontend.js?ver=HTML / DOM Fingerprints
rsc_shortcode_wrapperrsc_hidden_contentdata-rsc-restrictedrestrictedContent[RSC]