Royal Access Security & Risk Analysis

wordpress.org/plugins/royal-access

Free WordPress accessibility toolbar with 14 features, WCAG code fixes, contrast checker & statement generator. Not an overlay — no account needed.

0 active installs v1.0.3 PHP 7.4+ WP 5.8+ Updated Apr 2, 2026
a11yaccessibilityadatoolbarwcag
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Royal Access Safe to Use in 2026?

Generally Safe

Score 100/100

Royal Access has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The plugin 'royal-access' v1.0.3 exhibits a mixed security posture. On the positive side, it demonstrates excellent practices in data handling, with all SQL queries using prepared statements and all output properly escaped. There are no recorded vulnerabilities (CVEs) for this plugin, suggesting a history of stable and secure development. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests is commendable.

However, a significant concern lies in its attack surface. The plugin exposes three AJAX handlers, all of which lack authentication checks. This means any user, even an unauthenticated one, could potentially trigger these handlers, leading to unauthorized actions or information disclosure. While the taint analysis found no critical or high severity flows, the presence of two flows with unsanitized paths warrants caution. Combined with a single nonce check for three entry points, the lack of robust authorization on the AJAX handlers creates a substantial risk.

In conclusion, while the plugin excels in data sanitization and output encoding and has a clean vulnerability history, the unprotected AJAX endpoints are a critical weakness. This is a classic example of a plugin with strong internal data handling but a weak external interface. The deduction is primarily driven by the unprotected AJAX handlers and the unsanitized taint flows.

Key Concerns

  • AJAX handlers without authentication checks
  • Taint flows with unsanitized paths
  • Insufficient nonce checks for entry points
Vulnerabilities
None known

Royal Access Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Royal Access Release Timeline

v1.0.3Current
Code Analysis
Analyzed Apr 16, 2026

Royal Access Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
172 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped172 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
save_settings (includes/class-raccess-ajax.php:53)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
3 unprotected

Royal Access Attack Surface

Entry Points3
Unprotected3

AJAX Handlers 3

authwp_ajax_raccess_save_settingsincludes/class-raccess-ajax.php:26
authwp_ajax_raccess_check_contrastincludes/class-raccess-ajax.php:27
authwp_ajax_raccess_generate_statementincludes/class-raccess-ajax.php:28
WordPress Hooks 14
actionadmin_menuincludes/class-raccess-admin.php:26
actionadmin_enqueue_scriptsincludes/class-raccess-admin.php:27
filteradmin_footer_textincludes/class-raccess-admin.php:28
actionwp_body_openincludes/class-raccess-fixes.php:29
actionwp_enqueue_scriptsincludes/class-raccess-fixes.php:30
actionwp_enqueue_scriptsincludes/class-raccess-fixes.php:34
actionwp_enqueue_scriptsincludes/class-raccess-fixes.php:38
filterexcerpt_moreincludes/class-raccess-fixes.php:42
filterthe_content_more_linkincludes/class-raccess-fixes.php:43
actionwp_enqueue_scriptsincludes/class-raccess-toolbar.php:29
actionwp_enqueue_scriptsincludes/class-raccess-toolbar.php:32
actionwp_footerincludes/class-raccess-toolbar.php:33
actionplugins_loadedroyal-access.php:62
filterplugin_row_metaroyal-access.php:86
Maintenance & Trust

Royal Access Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedApr 2, 2026
PHP min version7.4
Downloads42

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Royal Access Developer Profile

Royal Plugins

4 plugins · 500 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
10 days
View full developer profile
Detection Fingerprints

How We Detect Royal Access

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/royal-access/admin/css/admin.css/wp-content/plugins/royal-access/admin/js/admin.js/wp-content/plugins/royal-access/assets/css/royal-access-toolbar.css/wp-content/plugins/royal-access/assets/js/royal-access-toolbar.js/wp-content/plugins/royal-access/assets/js/royal-access-fixes.js
Script Paths
/wp-content/plugins/royal-access/admin/js/admin.js/wp-content/plugins/royal-access/assets/js/royal-access-toolbar.js/wp-content/plugins/royal-access/assets/js/royal-access-fixes.js
Version Parameters
royal-access/admin/css/admin.css?ver=royal-access/admin/js/admin.js?ver=royal-access/assets/css/royal-access-toolbar.css?ver=royal-access/assets/js/royal-access-toolbar.js?ver=royal-access/assets/js/royal-access-fixes.js?ver=

HTML / DOM Fingerprints

CSS Classes
raccess-toolbarraccess-toolbar-containerraccess-toolbar-featuresraccess-toolbar-featureraccess-toolbar-feature-iconraccess-toolbar-feature-labelraccess-toolbar-closeraccess-toolbar-bottom+52 more
HTML Comments
<!-- Global settings helpers --><!-- Activation / deactivation. --><!-- Bootstrap on plugins_loaded. --><!-- Settings link on Plugins page. -->+12 more
Data Attributes
data-raccess-feature
JS Globals
raccess_ajaxRACCESS_VERSIONRACCESS_PLUGIN_FILERACCESS_PLUGIN_DIRRACCESS_PLUGIN_URLRACCESS_PLUGIN_BASENAME
FAQ

Frequently Asked Questions about Royal Access