UM User Switching Security & Risk Analysis

wordpress.org/plugins/um-user-switching

Addon that integrates User Switching to Ultimate Member

10 active installs v1.0.1.1 PHP + WP 3.7+ Updated Dec 12, 2018
fast-user-switchingmultisiteprofilesuser-switchingusers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is UM User Switching Safe to Use in 2026?

Generally Safe

Score 85/100

UM User Switching has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "um-user-switching" plugin, in version 1.0.1.1, demonstrates a generally positive security posture based on the provided static analysis and vulnerability history. There are no reported CVEs, indicating a lack of known critical or high-severity vulnerabilities in its past. The static analysis also shows a clean slate regarding dangerous functions, SQL injection risks (all queries use prepared statements), and external HTTP requests. The attack surface is reported as zero, which is highly unusual and suggests the plugin may not have active components exposed for direct user interaction or integration, or the analysis might have limitations in identifying certain entry points.

However, the static analysis does reveal a concern with output escaping, where only 54% of the outputs are properly escaped. This leaves a portion of the plugin's output potentially vulnerable to cross-site scripting (XSS) attacks if user-supplied data is not adequately sanitized before being displayed. While there are no explicit taint flows or specific vulnerability types flagged, the unescaped output is a tangible risk that requires attention. The absence of capability checks and nonce checks, combined with zero unprotected entry points, is puzzling. If there were any entry points, their lack of authorization checks would be a major concern. Given the zero-entry-point finding, the lack of these checks might be irrelevant in practice, but it's a point to note for future development.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

UM User Switching Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

UM User Switching Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
7 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

54% escaped13 total outputs
Attack Surface

UM User Switching Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actioninittrunk\um-user-switching.php:151
actionum_profile_headertrunk\um-user-switching.php:152
actionall_admin_noticestrunk\um-user-switching.php:216
actionadmin_inittrunk\um-user-switching.php:219
actionplugins_loadedtrunk\um-user-switching.php:363
actioninitum-user-switching.php:151
actionum_profile_headerum-user-switching.php:152
actionall_admin_noticesum-user-switching.php:216
actionadmin_initum-user-switching.php:219
actionplugins_loadedum-user-switching.php:364
Maintenance & Trust

UM User Switching Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedDec 12, 2018
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

UM User Switching Developer Profile

SuitePlugins

17 plugins · 2K total installs

90
trust score
Avg Security Score
86/100
Avg Patch Time
7 days
View full developer profile
Detection Fingerprints

How We Detect UM User Switching

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Generator Patterns
generator-plugin-wp
Version Parameters
um-user-switching/includes/class-um-user-switching.php?ver=

HTML / DOM Fingerprints

CSS Classes
user_switching
Shortcode Output
<a href="" class="" id="user_switching"><i class="um-faicon-sign-in" aria-hidden="true"></i> Switch&nbsp;To</a>
FAQ

Frequently Asked Questions about UM User Switching