User Access Manager Security & Risk Analysis

wordpress.org/plugins/user-access-manager

With the "User Access Manager"-plugin you can manage the access to your posts, pages and files.

10K active installs v2.3.11 PHP 8.0+ WP 4.7+ Updated Jan 26, 2026
accessmember-accessuser-access-manageruser-management
98
A · Safe
CVEs total4
Unpatched0
Last CVEAug 4, 2023
Safety Verdict

Is User Access Manager Safe to Use in 2026?

Generally Safe

Score 98/100

User Access Manager has a strong security track record. Known vulnerabilities have been patched promptly.

4 known CVEsLast CVE: Aug 4, 2023Updated 2mo ago
Risk Assessment

The 'user-access-manager' plugin version 2.3.11 exhibits a mixed security posture. On the positive side, the static analysis reveals a very limited attack surface with no unprotected AJAX handlers, REST API routes, shortcodes, or cron events. This suggests that direct entry points for potential attackers are well-guarded. Furthermore, the plugin makes extensive use of prepared statements for SQL queries, which is a strong security practice. However, several significant concerns emerge. The presence of a dangerous `unserialize` function without immediate context about its usage is a red flag, as deserialization vulnerabilities can be severe if not handled with extreme care. The most concerning aspect is the extremely low percentage of properly escaped output (1%), indicating a high likelihood of Cross-Site Scripting (XSS) vulnerabilities across various output mechanisms. The vulnerability history further reinforces these concerns, with four previously disclosed CVEs, including one high-severity XSS and three medium-severity issues related to improper neutralization, use of less trusted sources, and CSRF. This pattern suggests a recurring struggle with input validation and output sanitization, despite efforts to secure SQL queries.

Key Concerns

  • Low percentage of properly escaped output (1%)
  • Presence of dangerous unserialize function
  • High severity CVE in vulnerability history
  • Multiple medium severity CVEs in history
  • Vulnerability history indicates recurring issues
Vulnerabilities
4

User Access Manager Security Vulnerabilities

CVEs by Year

1 CVE in 2011
2011
2 CVEs in 2017
2017
1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

High
1
Medium
3

4 total CVEs

CVE-2022-1601medium · 5.3Use of Less Trusted Source

User Access Manager <= 2.2.16 - IP Spoofing

Aug 4, 2023 Patched in 2.2.18 (172d)
WF-5b3268c2-7cdd-4839-9859-42218d4d632b-user-access-managermedium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

User Access Manager <= 1.2.14 - Reflected Cross-Site Scripting

Sep 5, 2017 Patched in 2.0.0 (2331d)
WF-7c6e233f-c612-4625-8097-0637e976190d-user-access-managermedium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

User Access Manager <= 2.0.8 - Reflected Cross-Site Scripting

Sep 5, 2017 Patched in 2.0.9 (2331d)
CVE-2011-5328high · 8.8Cross-Site Request Forgery (CSRF)

User Access Manager < 1.2 - Cross-Site Request Forgery

Oct 11, 2011 Patched in 1.2 (4487d)
Code Analysis
Analyzed Mar 16, 2026

User Access Manager Code Analysis

Dangerous Functions
1
Raw SQL Queries
3
36 prepared
Unescaped Output
170
1 escaped
Nonce Checks
1
Capability Checks
1
File Operations
30
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserializereturn unserialize(base64_decode(file_get_contents($cacheFile)));src\Cache\FileSystemCacheProvider.php:173

SQL Query Safety

92% prepared39 total queries

Output Escaping

1% escaped171 total outputs
Attack Surface

User Access Manager Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_noticesuser-access-manager.php:45
actionadmin_noticesuser-access-manager.php:61
actioninituser-access-manager.php:80
Maintenance & Trust

User Access Manager Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 26, 2026
PHP min version8.0
Downloads1.3M

Community Trust

Rating86/100
Number of ratings114
Active installs10K
Developer Profile

User Access Manager Developer Profile

gm_alex

2 plugins · 10K total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
2330 days
View full developer profile
Detection Fingerprints

How We Detect User Access Manager

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/user-access-manager/assets/css/backend/user-access-manager.css/wp-content/plugins/user-access-manager/assets/css/frontend/user-access-manager.css/wp-content/plugins/user-access-manager/assets/js/backend/user-access-manager.js/wp-content/plugins/user-access-manager/assets/js/frontend/user-access-manager.js/wp-content/plugins/user-access-manager/assets/js/vendor/jquery/jquery.js
Script Paths
/wp-content/plugins/user-access-manager/assets/js/backend/user-access-manager.js/wp-content/plugins/user-access-manager/assets/js/frontend/user-access-manager.js
Version Parameters
user-access-manager/assets/css/backend/user-access-manager.css?ver=user-access-manager/assets/css/frontend/user-access-manager.css?ver=user-access-manager/assets/js/backend/user-access-manager.js?ver=user-access-manager/assets/js/frontend/user-access-manager.js?ver=

HTML / DOM Fingerprints

CSS Classes
uam_user_group
HTML Comments
<!-- BOF --><!-- Not the best way to handle full user access. Capabilities seem --><!-- to be the right way, but it is way challenging. -->
Data Attributes
uam-access
JS Globals
uam_ajax_object
REST Endpoints
/wp-json/user-access-manager/v1/user
Shortcode Output
[uam_restrict_content]
FAQ

Frequently Asked Questions about User Access Manager