
Superadmin Helper Security & Risk Analysis
wordpress.org/plugins/superadmin-helperSet of utilities for managing multisite Wordpress installations. Logging, simple permban, etc.
Is Superadmin Helper Safe to Use in 2026?
Generally Safe
Score 85/100Superadmin Helper has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "superadmin-helper" plugin version 2.0.5 exhibits a generally good security posture in several areas. The absence of known vulnerabilities, a clean vulnerability history, and the lack of file operations or external HTTP requests are all positive indicators. Furthermore, the plugin does not expose any direct attack surface through AJAX, REST API, shortcodes, or cron events, and importantly, has no unprotected entry points.
However, the code analysis reveals significant concerns. A substantial 55% of SQL queries are not using prepared statements, which creates a considerable risk of SQL injection vulnerabilities. Compounding this, only 18% of output is properly escaped, indicating a high potential for cross-site scripting (XSS) vulnerabilities. The taint analysis also identified two flows with unsanitized paths, although these are not currently classified as critical or high severity, they warrant attention. The lack of nonce checks and capability checks on any potential implicit entry points (though none are directly exposed) is also a weakness that could be exploited if an attack surface were to emerge in future versions or through interactions with other plugins.
In conclusion, while the plugin benefits from a clean security history and a limited direct attack surface, the prevalent use of raw SQL queries and inadequate output escaping present substantial security risks. These weaknesses could be exploited to compromise database integrity or execute malicious scripts within the WordPress environment. Addressing these code-level issues should be a priority to improve the overall security of "superadmin-helper".
Key Concerns
- Raw SQL queries without prepared statements
- Insufficient output escaping
- Unsanitized paths in taint analysis
- Lack of nonce checks
- Lack of capability checks
Superadmin Helper Security Vulnerabilities
Superadmin Helper Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Superadmin Helper Attack Surface
WordPress Hooks 45
Maintenance & Trust
Superadmin Helper Maintenance & Trust
Maintenance Signals
Community Trust
Superadmin Helper Alternatives
WP Mail Logging
wp-mail-logging
Log, view, and resend all emails sent from your WordPress site. Great for resolving email sending issues or keeping a copy for auditing.
Captcha Code
captcha-code-authentication
GDPR compatible captcha anti-spam protection for login form, comments form, registration form & lost password form. Eliminate spam with captcha.
CloudSecure WP Security
cloudsecure-wp-security
管理画面とログインURLをサイバー攻撃から守る、国産・日本語対応のセキュリティ対策プラグインです。 かんたんな設定を行うだけで、不正アクセスや不正ログインからあなたのWordPressを保護します。
Titan Anti-spam & Security
anti-spam
Block spam comments, defend against login attempts, and strengthen site security with anti-spam, brute-force protection, and two-factor authentication …
Simple Login Captcha
simple-login-captcha
Adds a simple 3-digit number captcha on the login form.
Superadmin Helper Developer Profile
8 plugins · 200 total installs
How We Detect Superadmin Helper
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
form-table<!--Superadmin mód-->id="primary_blog"name="primary_blog"id="suh_last_login"