User Domain Whitelist Security & Risk Analysis

wordpress.org/plugins/user-domain-whitelist

The User Domain Whitelist/Blacklist plugin limits user registration to only registrants with an email address from the domain white list provided by t …

300 active installs vv1.5.1 PHP + WP 2.8.2+ Updated Dec 25, 2017
blacklistdomainemail-addressregistrationwhitelist
84
B · Generally Safe
CVEs total1
Unpatched0
Last CVEFeb 22, 2014
Download
Safety Verdict

Is User Domain Whitelist Safe to Use in 2026?

Mostly Safe

Score 84/100

User Domain Whitelist is generally safe to use though it hasn't been updated recently. 1 past CVE were resolved. Keep it updated.

1 known CVELast CVE: Feb 22, 2014Updated 8yr ago
Risk Assessment

The 'user-domain-whitelist' plugin version 1.5.1 exhibits a generally positive security posture based on static analysis, with no identified dangerous functions, SQL injection vulnerabilities, or unsanitized taint flows. The plugin also demonstrates good practices by utilizing prepared statements for all SQL queries and incorporating nonce and capability checks. The attack surface appears to be minimal, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that lack authentication or permission checks.

However, a significant concern arises from the output escaping analysis, where 100% of the identified outputs are not properly escaped. This lack of escaping could lead to Cross-Site Scripting (XSS) vulnerabilities if any user-controlled data is displayed directly in the output without sanitization. The vulnerability history, while showing no currently unpatched CVEs, indicates a past high-severity vulnerability, specifically a Cross-Site Request Forgery (CSRF), in 2014. While this vulnerability is old and likely patched in the analyzed version, it suggests a potential for past security oversights and highlights the importance of continuous security review and updates.

In conclusion, the plugin has strengths in its controlled attack surface and secure data handling for SQL. The primary weakness is the complete lack of output escaping, posing an XSS risk. The historical CSRF vulnerability, though dated, serves as a reminder that even seemingly secure plugins can have exploitable flaws. Further investigation into how outputs are generated and if user input is involved is crucial.

Key Concerns

  • 0% of outputs properly escaped
  • Past high severity CVE (CSRF)
Vulnerabilities
1

User Domain Whitelist Security Vulnerabilities

CVEs by Year

1 CVE in 2014
2014
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

CVE-2014-10381high · 8.8Cross-Site Request Forgery (CSRF)

User Domain Whitelist <= 1.4 - Cross-Site Request Forgery

Feb 22, 2014 Patched in 1.5 (3622d)
Code Analysis
Analyzed Mar 16, 2026

User Domain Whitelist Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped7 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
displayAdminPage (user-domain-whitelist.php:48)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

User Domain Whitelist Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menuuser-domain-whitelist.php:179
actionadmin_inituser-domain-whitelist.php:181
actionuser-domain-whitelist/user-domain-whitelist.phpuser-domain-whitelist.php:188
actionregister_postuser-domain-whitelist.php:189
actionplugins_loadeduser-domain-whitelist.php:190
Maintenance & Trust

User Domain Whitelist Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedDec 25, 2017
PHP min version
Downloads14K

Community Trust

Rating82/100
Number of ratings9
Active installs300
Developer Profile

User Domain Whitelist Developer Profile

Warren Harrison

1 plugin · 300 total installs

68
trust score
Avg Security Score
84/100
Avg Patch Time
3622 days
View full developer profile
Detection Fingerprints

How We Detect User Domain Whitelist

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/user-domain-whitelist/user-domain-whitelist.php

HTML / DOM Fingerprints

CSS Classes
domain-list
Data Attributes
name="domain_whitelist"name="domain_blacklist"name="bad_domain_message"name="update_HMUserDomainWhitelist"
FAQ

Frequently Asked Questions about User Domain Whitelist