User Permissions Security & Risk Analysis

wordpress.org/plugins/user-permissions

This plugin provides the ability to configure post-specific permissions.

30 active installs v0.8.4 PHP + WP 2.0+ Updated May 5, 2012
permissions
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is User Permissions Safe to Use in 2026?

Generally Safe

Score 85/100

User Permissions has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "user-permissions" plugin version 0.8.4 exhibits a generally good security posture with no known historical vulnerabilities or critical code signals. The static analysis reveals a very small attack surface with no unprotected entry points, which is a strong positive indicator. The plugin also demonstrates an effort towards secure coding practices, with a majority of SQL queries using prepared statements and a good percentage of outputs being properly escaped. However, the presence of four instances of the `unserialize` function is a significant concern. While no taint flows were identified as unsanitized, `unserialize` is inherently risky as it can lead to Remote Code Execution (RCE) vulnerabilities if used with untrusted input. Furthermore, the complete absence of nonce checks on potential entry points, despite the low attack surface, leaves room for potential CSRF attacks if any functionality were to be exposed indirectly or in future updates. The lack of recorded vulnerabilities is reassuring, but it doesn't negate the inherent risks introduced by insecure functions like `unserialize`.

Key Concerns

  • Use of unserialize function
  • Missing nonce checks
  • SQL queries not always prepared
  • Output not always escaped
Vulnerabilities
None known

User Permissions Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

User Permissions Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

User Permissions Code Analysis

Dangerous Functions
4
Raw SQL Queries
1
2 prepared
Unescaped Output
7
13 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$data = unserialize ($row->meta_value);models\permissions.php:88
unserialize$data = unserialize ($data);models\permissions.php:90
unserialize$perms = unserialize (unserialize ($row->meta_value));user-permissions.php:136
unserialize$perms = unserialize (unserialize ($row->meta_value));user-permissions.php:136

SQL Query Safety

67% prepared3 total queries

Output Escaping

65% escaped20 total outputs
Attack Surface

User Permissions Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actioninitplugin.php:124
filteruser_has_capuser-permissions.php:35
actionthe_postsuser-permissions.php:36
actiondbx_post_sidebaruser-permissions.php:40
actiondbx_page_sidebaruser-permissions.php:41
actionedit_page_formuser-permissions.php:42
actionsave_postuser-permissions.php:43
Maintenance & Trust

User Permissions Maintenance & Trust

Maintenance Signals

WordPress version tested2.6.2
Last updatedMay 5, 2012
PHP min version
Downloads23K

Community Trust

Rating50/100
Number of ratings2
Active installs30
Developer Profile

User Permissions Developer Profile

John Godley

14 plugins · 2.2M total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
4069 days
View full developer profile
Detection Fingerprints

How We Detect User Permissions

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about User Permissions