User Hierarchy Security & Risk Analysis

wordpress.org/plugins/user-hierarchy

Control user management on a per-role basis. Allow users of a certain role to only add, edit or delete users from specific other roles.

20 active installs v0.1.2 PHP + WP 3.1+ Updated Apr 27, 2013
hierarchyrolerolesuserusers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is User Hierarchy Safe to Use in 2026?

Generally Safe

Score 85/100

User Hierarchy has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "user-hierarchy" plugin version 0.1.2 presents a very low security risk. The static analysis indicates a remarkably clean codebase with no identified dangerous functions, SQL queries performed using prepared statements, and all outputs properly escaped. Crucially, there are no identified entry points like AJAX handlers, REST API routes, or shortcodes that are not protected by authentication or permission checks, and the plugin does not perform file operations or external HTTP requests. The taint analysis also shows no flows with unsanitized paths, further reinforcing the lack of apparent code-level vulnerabilities.

The vulnerability history further supports this positive assessment, with zero known CVEs recorded against this plugin. This suggests a consistent track record of security by the developers or a lack of targeted exploitation. However, it is important to note that the plugin is at version 0.1.2, which is a very early version number. While the current analysis is highly positive, it's possible that more complex vulnerabilities could emerge as the plugin matures and its functionality expands. For a version this early, the absence of any issues is excellent, but ongoing vigilance and updates will be key as it evolves.

In conclusion, the "user-hierarchy" plugin v0.1.2 appears to be securely developed. Its minimal attack surface, robust coding practices (prepared statements, output escaping), and absence of any historical vulnerabilities make it a strong contender for a secure plugin. The primary, albeit minor, consideration is its early version number, which warrants continued monitoring for future updates. For its current state, it is highly recommended from a security perspective.

Vulnerabilities
None known

User Hierarchy Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

User Hierarchy Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

User Hierarchy Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

User Hierarchy Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedApr 27, 2013
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

User Hierarchy Developer Profile

Jesper van Engelen

7 plugins · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect User Hierarchy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/user-hierarchy/lib/css/user-hierarchy-admin.css/wp-content/plugins/user-hierarchy/lib/js/user-hierarchy-admin.js
Script Paths
/wp-content/plugins/user-hierarchy/lib/js/user-hierarchy-admin.js
Version Parameters
user-hierarchy/lib/css/user-hierarchy-admin.css?ver=user-hierarchy/lib/js/user-hierarchy-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
jwuh-role-manager-field
Data Attributes
data-jwuh-role-manager-field
JS Globals
jwuh_admin_params
FAQ

Frequently Asked Questions about User Hierarchy