
User Access Manager Security & Risk Analysis
wordpress.org/plugins/user-access-managerWith the "User Access Manager"-plugin you can manage the access to your posts, pages and files.
Is User Access Manager Safe to Use in 2026?
Generally Safe
Score 98/100User Access Manager has a strong security track record. Known vulnerabilities have been patched promptly.
The 'user-access-manager' plugin version 2.3.11 exhibits a mixed security posture. On the positive side, the static analysis reveals a very limited attack surface with no unprotected AJAX handlers, REST API routes, shortcodes, or cron events. This suggests that direct entry points for potential attackers are well-guarded. Furthermore, the plugin makes extensive use of prepared statements for SQL queries, which is a strong security practice. However, several significant concerns emerge. The presence of a dangerous `unserialize` function without immediate context about its usage is a red flag, as deserialization vulnerabilities can be severe if not handled with extreme care. The most concerning aspect is the extremely low percentage of properly escaped output (1%), indicating a high likelihood of Cross-Site Scripting (XSS) vulnerabilities across various output mechanisms. The vulnerability history further reinforces these concerns, with four previously disclosed CVEs, including one high-severity XSS and three medium-severity issues related to improper neutralization, use of less trusted sources, and CSRF. This pattern suggests a recurring struggle with input validation and output sanitization, despite efforts to secure SQL queries.
Key Concerns
- Low percentage of properly escaped output (1%)
- Presence of dangerous unserialize function
- High severity CVE in vulnerability history
- Multiple medium severity CVEs in history
- Vulnerability history indicates recurring issues
User Access Manager Security Vulnerabilities
CVEs by Year
Severity Breakdown
4 total CVEs
User Access Manager <= 2.2.16 - IP Spoofing
User Access Manager <= 1.2.14 - Reflected Cross-Site Scripting
User Access Manager <= 2.0.8 - Reflected Cross-Site Scripting
User Access Manager < 1.2 - Cross-Site Request Forgery
User Access Manager Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
User Access Manager Attack Surface
WordPress Hooks 3
Maintenance & Trust
User Access Manager Maintenance & Trust
Maintenance Signals
Community Trust
User Access Manager Alternatives
MembershipWorks – Membership, Events & Directory
memberfindme
All-in-one membership, directory, events and donations for organizations. Secure member profiles, renewals, upgrades and limit member only access to c …
New Post Notification
new-post-notification
Simply notifies users if a new post has been published. This can also be used as an addon for User-Access-Manager. Users will only be notified if they …
DP Admin Access Menu
dp-admin-access-menu
Control which WordPress backend menu items are visible to specific users. Perfect for managing user access and customizing admin experience.
Network Restricted Members
network-restricted-members
Restrict user access to selected sites on open multisite networks.
Access Guard
access-guard
Access Guard enhances security by managing user permissions and banning IPs to protect sensitive content.
User Access Manager Developer Profile
2 plugins · 10K total installs
How We Detect User Access Manager
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/user-access-manager/assets/css/backend/user-access-manager.css/wp-content/plugins/user-access-manager/assets/css/frontend/user-access-manager.css/wp-content/plugins/user-access-manager/assets/js/backend/user-access-manager.js/wp-content/plugins/user-access-manager/assets/js/frontend/user-access-manager.js/wp-content/plugins/user-access-manager/assets/js/vendor/jquery/jquery.js/wp-content/plugins/user-access-manager/assets/js/backend/user-access-manager.js/wp-content/plugins/user-access-manager/assets/js/frontend/user-access-manager.jsuser-access-manager/assets/css/backend/user-access-manager.css?ver=user-access-manager/assets/css/frontend/user-access-manager.css?ver=user-access-manager/assets/js/backend/user-access-manager.js?ver=user-access-manager/assets/js/frontend/user-access-manager.js?ver=HTML / DOM Fingerprints
uam_user_group<!-- BOF --><!-- Not the best way to handle full user access. Capabilities seem --><!-- to be the right way, but it is way challenging. -->uam-accessuam_ajax_object/wp-json/user-access-manager/v1/user[uam_restrict_content]