Restrict – membership, site, content and user access restrictions for WordPress Security & Risk Analysis

wordpress.org/plugins/restricted-content

Restrict content easily to logged in users, members with a specific role or user capability, to it's author, Tickera, Easy Digital Downloads or W …

2K active installs v2.3.4 PHP + WP 4.3+ Updated Jan 8, 2026
protect-contentrestrict-accessrestrict-contentrestrict-siterestricted-content
99
A · Safe
CVEs total2
Unpatched0
Last CVEDec 10, 2024
Safety Verdict

Is Restrict – membership, site, content and user access restrictions for WordPress Safe to Use in 2026?

Generally Safe

Score 99/100

Restrict – membership, site, content and user access restrictions for WordPress has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Dec 10, 2024Updated 2mo ago
Risk Assessment

The 'restricted-content' plugin version 2.3.4 exhibits a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries and performing capability checks on a significant number of entry points. The absence of raw SQL, file operations, and external HTTP requests is also commendable, contributing to a reduced attack surface in those areas. Furthermore, the static analysis shows no critical or high-severity taint flows, indicating that user input is generally handled with care.

However, the presence of the `unserialize` function is a notable concern, as it can lead to Remote Code Execution vulnerabilities if not handled with extreme caution and strict input validation, which is not explicitly detailed as sanitized in the static analysis. While the plugin has a single shortcode, which is the only entry point identified, and it has a nonce check and capability checks, the potential risk associated with `unserialize` should not be underestimated. The vulnerability history reveals two past medium-severity CVEs, one related to information exposure and another to Cross-site Scripting. Although there are currently no unpatched vulnerabilities, the recurring types suggest a historical weakness in input sanitization or output escaping for specific scenarios.

In conclusion, while the plugin has made strides in secure coding practices, particularly with database interactions and general capability enforcement, the lingering threat from the `unserialize` function and the historical pattern of XSS and information exposure vulnerabilities warrant vigilance. The plugin's strengths lie in its adherence to prepared statements and capability checks, but its weaknesses are concentrated in the potential for deserialization vulnerabilities and the need for continued scrutiny of its sanitization and escaping logic, especially considering past CVEs.

Key Concerns

  • Use of unserialize function detected
  • Bundled library Freemius v1.0 outdated (potential)
  • Past CVEs indicate historical sanitization/escaping issues
Vulnerabilities
2

Restrict – membership, site, content and user access restrictions for WordPress Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2024-11351medium · 5.3Exposure of Sensitive Information to an Unauthorized Actor

Restrict – membership, site, content and user access restrictions for WordPress <= 2.2.8 - Unauthenticated Content Restriction Bypass to Sensitive Information Exposure

Dec 10, 2024 Patched in 2.2.9 (2d)
CVE-2023-41861medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Restrict <= 2.2.4 - Reflected Cross-Site Scripting

Sep 5, 2023 Patched in 2.2.5 (140d)
Code Analysis
Analyzed Mar 16, 2026

Restrict – membership, site, content and user access restrictions for WordPress Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
14 prepared
Unescaped Output
74
426 escaped
Nonce Checks
1
Capability Checks
7
File Operations
0
External Requests
0
Bundled Libraries
2

Dangerous Functions Found

unserialize$data = @unserialize( $value );index.php:661

Bundled Libraries

Freemius1.0jQuery

SQL Query Safety

100% prepared14 total queries

Output Escaping

85% escaped500 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
<settings-general> (includes\settings\settings-general.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Restrict – membership, site, content and user access restrictions for WordPress Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[RSC] index.php:114
WordPress Hooks 23
filterrsc_settings_store_fieldsincludes\freeaddons\comments.php:4
filterrc_settings_new_sectionsincludes\freeaddons\comments.php:19
filtercomments_openincludes\freeaddons\comments.php:34
filtercomments_arrayincludes\freeaddons\comments.php:60
filterrc_settings_new_sectionsincludes\freeaddons\simple-urls.php:9
filterrsc_settings_store_fieldsincludes\freeaddons\simple-urls.php:27
actionrc_settings_new_menusincludes\freeaddons\simple-urls.php:86
filtersimple_urls_redirect_urlincludes\freeaddons\simple-urls.php:93
actionsiteorigin_panels_before_contentincludes\freeaddons\siteorigin-integration.php:4
actionsiteorigin_panels_after_contentincludes\freeaddons\siteorigin-integration.php:39
actionwoocommerce_before_main_contentincludes\freeaddons\woocommerce-shop-page.php:7
actionwoocommerce_before_shop_loopincludes\freeaddons\woocommerce-shop-page.php:49
actionwoocommerce_after_shop_loopincludes\freeaddons\woocommerce-shop-page.php:57
actionplugins_loadedindex.php:97
actionadmin_enqueue_scriptsindex.php:98
actionadd_meta_boxesindex.php:99
actionsave_postindex.php:105
filterthe_contentindex.php:106
filterrsc_the_contentindex.php:107
actionadmin_menuindex.php:115
filterfirst_rc_menu_handlerindex.php:116
actionadmin_enqueue_scriptsindex.php:122
filterpre_get_postsindex.php:132
Maintenance & Trust

Restrict – membership, site, content and user access restrictions for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 8, 2026
PHP min version
Downloads65K

Community Trust

Rating84/100
Number of ratings25
Active installs2K
Developer Profile

Restrict – membership, site, content and user access restrictions for WordPress Developer Profile

Tickera

2 plugins · 5K total installs

75
trust score
Avg Security Score
94/100
Avg Patch Time
118 days
View full developer profile
Detection Fingerprints

How We Detect Restrict – membership, site, content and user access restrictions for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/restricted-content/assets/css/admin.css/wp-content/plugins/restricted-content/assets/css/style.css/wp-content/plugins/restricted-content/assets/js/admin.js/wp-content/plugins/restricted-content/assets/js/frontend.js
Script Paths
/wp-content/plugins/restricted-content/assets/js/admin.js/wp-content/plugins/restricted-content/assets/js/frontend.js
Version Parameters
restricted-content/assets/css/admin.css?ver=restricted-content/assets/css/style.css?ver=restricted-content/assets/js/admin.js?ver=restricted-content/assets/js/frontend.js?ver=

HTML / DOM Fingerprints

CSS Classes
rsc_shortcode_wrapperrsc_hidden_content
Data Attributes
data-rsc-restricted
JS Globals
restrictedContent
Shortcode Output
[RSC]
FAQ

Frequently Asked Questions about Restrict – membership, site, content and user access restrictions for WordPress