Simple User Locking Security & Risk Analysis

wordpress.org/plugins/simple-user-locking

Prevent users (like e.g. ex-employees, rule breakers or spamers) from logging into your WordPress installation for a certain timeframe or permanently …

0 active installs v1.0.1 PHP 7.0+ WP 5.0+ Updated Jul 4, 2019
authenticationcontrollockingsecurityuser
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple User Locking Safe to Use in 2026?

Generally Safe

Score 85/100

Simple User Locking has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The static analysis of the "simple-user-locking" plugin v1.0.1 indicates a generally strong security posture with no identified critical vulnerabilities in code signals or taint analysis. The plugin exhibits good practices by avoiding dangerous functions, file operations, and external HTTP requests. Notably, all SQL queries use prepared statements, which significantly mitigates SQL injection risks. The plugin also demonstrates an awareness of security by including two capability checks. However, a concerning aspect is the complete absence of nonce checks across all entry points, which are critical for preventing Cross-Site Request Forgery (CSRF) attacks, especially if any functionality were to be added that modifies data.

The vulnerability history shows a clean slate with zero known CVEs. This lack of past vulnerabilities, combined with the positive findings in static analysis, suggests a plugin that is either very new, has been meticulously developed, or has not been subjected to extensive security scrutiny. The limited attack surface with zero entry points is a positive indicator, but it's important to note that the lack of protection on these zero entry points is still a concern as it represents a potential oversight for future development. While the current state appears safe, the lack of nonce checks represents a significant weakness that should be addressed proactively.

Key Concerns

  • No nonce checks across all entry points
  • Output escaping is not fully implemented (73% proper)
Vulnerabilities
None known

Simple User Locking Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Simple User Locking Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
8 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

73% escaped11 total outputs
Attack Surface

Simple User Locking Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionadmin_enqueue_scriptsadmin.php:6
actionshow_user_profileadmin.php:24
actionedit_user_profileadmin.php:25
actionedit_user_profile_updateadmin.php:141
actionwp_redirectadmin.php:146
actionwp_redirectadmin.php:149
actionload-user-edit.phpadmin.php:155
actionadmin_noticesadmin.php:159
filtermanage_users_columnsadmin.php:170
filterwpmu_users_columnsadmin.php:171
filtermanage_users_custom_columnadmin.php:195
filterauthenticatesimple-user-locking.php:87
actionadmin_initsimple-user-locking.php:91
Maintenance & Trust

Simple User Locking Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedJul 4, 2019
PHP min version7.0
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Simple User Locking Developer Profile

Blackbam

3 plugins · 200 total installs

69
trust score
Avg Security Score
85/100
Avg Patch Time
3450 days
View full developer profile
Detection Fingerprints

How We Detect Simple User Locking

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-user-locking/css/admin.css/wp-content/plugins/simple-user-locking/js/admin.js
Script Paths
/wp-content/plugins/simple-user-locking/js/admin.js
Version Parameters
simple-user-locking/css/admin.css?ver=simple-user-locking/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
sulock-nowrap
HTML Comments
Contains all visible admin stuff like e.g. the extra user profile fields.If you check this the user is permanently locked and can not log into the admin dashboard anymore.If you check this the user is temporarily locked out of the site and can not log into the admin dashboard until the specified point in time. Must be at least 5 minutes in the future, otherwise the templock is deactivated.
Data Attributes
sulock_permanently_lockedsulock_templock_datesulock_templock_time
JS Globals
sulock_resempty
FAQ

Frequently Asked Questions about Simple User Locking