Simple Membership Form Shortcode Security & Risk Analysis

wordpress.org/plugins/simple-membership-form-shortcode

Simple Membership Addon to generate registration form shortcode for specific membership access level.

3K active installs v1.1 PHP + WP 5.0+ Updated Nov 18, 2024
accessmembermembersmembershipusers
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple Membership Form Shortcode Safe to Use in 2026?

Generally Safe

Score 92/100

Simple Membership Form Shortcode has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The plugin 'simple-membership-form-shortcode' version 1.1 presents a mixed security posture. On one hand, the static analysis reveals a clean bill of health regarding dangerous functions, SQL injection vulnerabilities, file operations, and external HTTP requests. The absence of known CVEs and a clear vulnerability history further suggests a generally well-maintained and secure plugin. This indicates good development practices and attention to common security pitfalls.

However, there are significant concerns stemming from the lack of security checks and the output escaping. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events with any form of authentication or permission checks means that if any such entry points were introduced in future versions or are undocumented, they would be entirely unprotected. Furthermore, the fact that 100% of the single output identified is not properly escaped presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. This lack of output sanitization is a critical oversight that could be exploited if any user-supplied data is rendered directly to the browser.

In conclusion, while the plugin benefits from a clean history and avoidance of many common vulnerabilities, the complete lack of protected entry points and the unescaped output are serious weaknesses. The absence of authentication on potential entry points is a latent risk, and the unescaped output is an active and exploitable risk. Developers should prioritize implementing proper output escaping and consider adding authorization checks to any future entry points.

Key Concerns

  • 100% of outputs not properly escaped
  • No capability checks on any entry points
  • No nonce checks on any entry points
Vulnerabilities
None known

Simple Membership Form Shortcode Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Simple Membership Form Shortcode Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Simple Membership Form Shortcode Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionswpm_after_main_admin_menuswpm-form-shortcode.php:15
Maintenance & Trust

Simple Membership Form Shortcode Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 18, 2024
PHP min version
Downloads38K

Community Trust

Rating100/100
Number of ratings2
Active installs3K
Developer Profile

Simple Membership Form Shortcode Developer Profile

wp.insider

14 plugins · 76K total installs

76
trust score
Avg Security Score
95/100
Avg Patch Time
556 days
View full developer profile
Detection Fingerprints

How We Detect Simple Membership Form Shortcode

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-membership-form-shortcode/views/shortcode_generator.php

HTML / DOM Fingerprints

CSS Classes
swpm-shortcode-generator
Data Attributes
id="swpm-shortcode-generator"id="membership-level"id="shortcode"
Shortcode Output
[swpm_registration_form]
FAQ

Frequently Asked Questions about Simple Membership Form Shortcode