Role Based Content Restrictor Security & Risk Analysis

wordpress.org/plugins/role-based-content-restrictor

Restrict access to pages, posts, and custom post types by user roles. Redirect unauthorized users to a custom page or a global fallback.

50 active installs v1.2.0 PHP 7.4+ WP 5.8+ Updated Unknown
access-controlcontentmembershiprestrictroles-based-content-restrictor
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Role Based Content Restrictor Safe to Use in 2026?

Generally Safe

Score 100/100

Role Based Content Restrictor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "role-based-content-restrictor" v1.2.0 plugin exhibits a generally strong security posture based on the provided static analysis. The complete absence of known vulnerabilities, coupled with a clean taint analysis, is highly encouraging. The code also demonstrates good practices by utilizing prepared statements for all SQL queries, performing nonces checks, and implementing capability checks on its functionality.

However, the static analysis does reveal a notable concern regarding output escaping. With 17 total outputs and 35% of them being unescaped, this presents a significant risk for Cross-Site Scripting (XSS) vulnerabilities. While the current version has no reported vulnerabilities and a limited attack surface, an attacker could potentially leverage these unescaped outputs to inject malicious scripts if they can find a way to trigger the relevant code paths.

In conclusion, the plugin has a solid foundation with no known exploitable flaws and good security fundamentals in place. The primary area requiring immediate attention is the insufficient output escaping, which could lead to XSS vulnerabilities. Addressing this would significantly enhance the plugin's overall security and reduce its risk profile.

Key Concerns

  • Significant percentage of unescaped output
Vulnerabilities
None known

Role Based Content Restrictor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Role Based Content Restrictor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
11 escaped
Nonce Checks
1
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

65% escaped17 total outputs
Attack Surface

Role Based Content Restrictor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menurb-content-restrictor.php:30
actionadmin_initrb-content-restrictor.php:31
actionadd_meta_boxesrb-content-restrictor.php:34
actionsave_postrb-content-restrictor.php:35
actiontemplate_redirectrb-content-restrictor.php:38
Maintenance & Trust

Role Based Content Restrictor Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version7.4
Downloads363

Community Trust

Rating100/100
Number of ratings3
Active installs50
Developer Profile

Role Based Content Restrictor Developer Profile

inzidev

1 plugin · 50 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Role Based Content Restrictor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/role-based-content-restrictor/css/style.css/wp-content/plugins/role-based-content-restrictor/js/script.js
Script Paths
/wp-content/plugins/role-based-content-restrictor/js/script.js
Version Parameters
role-based-content-restrictor/style.css?ver=role-based-content-restrictor/script.js?ver=

HTML / DOM Fingerprints

Data Attributes
name="rbcr_settings[default_redirect]"name="rbcr_meta_nonce"name="rbcr_enabled"name="rbcr_allowed_roles[]"name="rbcr_redirect_page"
FAQ

Frequently Asked Questions about Role Based Content Restrictor