User Activation Keys Security & Risk Analysis

wordpress.org/plugins/user-activation-keys

A Multisite Network plugin for user activation key removal or approval.

100 active installs v4.6 PHP + WP 3.5+ Updated Aug 8, 2016
activationnetworknetwork-user-activationsignupusername
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is User Activation Keys Safe to Use in 2026?

Generally Safe

Score 85/100

User Activation Keys has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The user-activation-keys plugin v4.6 presents a mixed security posture. On the positive side, the static analysis reveals no known vulnerabilities in its history, no dangerous functions are used, all SQL queries are prepared, and there are no file operations or external HTTP requests. The presence of a nonce check is also a good practice. However, a significant concern arises from the complete lack of output escaping. This means that any dynamic data processed and displayed by the plugin is not being properly sanitized, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The absence of capability checks on entry points, although the attack surface is currently zero, is also a weakness that could become a problem if new entry points are introduced in future versions without proper authorization checks.

The taint analysis shows no detected vulnerabilities, which is encouraging. The plugin's vulnerability history is clean, suggesting a history of secure development or minimal exposure. However, the critical issue of unescaped output remains the most pressing concern. While the plugin has strengths in its secure handling of database operations and lack of dangerous functions, the unescaped output is a fundamental security flaw that could allow attackers to inject malicious scripts into the WordPress admin area or frontend, impacting users and potentially compromising the site.

In conclusion, while the user-activation-keys plugin v4.6 has demonstrated a strong track record with no past vulnerabilities and secure internal operations like prepared SQL queries, the severe lack of output escaping creates a substantial risk. The plugin is currently susceptible to XSS attacks. Addressing the output escaping issue should be the top priority for improving its security.

Key Concerns

  • Unescaped output detected
  • Missing capability checks on entry points
Vulnerabilities
None known

User Activation Keys Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

User Activation Keys Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
4
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped4 total outputs
Attack Surface

User Activation Keys Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionnetwork_admin_menuds_wp3_user_activation_keys.php:25
Maintenance & Trust

User Activation Keys Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedAug 8, 2016
PHP min version
Downloads42K

Community Trust

Rating96/100
Number of ratings20
Active installs100
Developer Profile

User Activation Keys Developer Profile

David Sader

4 plugins · 140 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect User Activation Keys

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrapwidefat
FAQ

Frequently Asked Questions about User Activation Keys