User Recent Search History Security & Risk Analysis

wordpress.org/plugins/user-recent-search-history

This plugin is to show user's recent search history.

10 active installs v1.1 PHP + WP 3.0+ Updated Apr 10, 2014
anonymous-users-search-historylogged-in-users-recent-search-historysearch-historysearch-history-widgetuser-recent-search
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is User Recent Search History Safe to Use in 2026?

Generally Safe

Score 85/100

User Recent Search History has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "user-recent-search-history" plugin version 1.1 exhibits a generally good security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the lack of dangerous functions, file operations, and external HTTP requests reduces potential vectors for exploitation. The plugin also has no known past vulnerabilities, which is a positive indicator of its development history. However, there are areas for improvement. The low percentage of SQL queries using prepared statements (17%) and a concerningly low 13% of outputs being properly escaped present potential risks. While taint analysis shows no issues, the low escape rate means that any data processed and displayed could be vulnerable to cross-site scripting (XSS) if input is not strictly validated at the point of entry. The absence of nonce checks and capability checks on entry points, though currently moot due to the lack of entry points, would be critical if any were introduced without proper security measures.

Key Concerns

  • Low SQL prepared statement usage
  • Low output escaping rate
  • Missing nonce checks on entry points
  • Missing capability checks on entry points
Vulnerabilities
None known

User Recent Search History Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

User Recent Search History Code Analysis

Dangerous Functions
0
Raw SQL Queries
5
1 prepared
Unescaped Output
14
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

17% prepared6 total queries

Output Escaping

13% escaped16 total outputs
Attack Surface

User Recent Search History Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninituser-search-history-widget.php:12
filterthe_postsuser-search-history-widget.php:46
actionwidgets_inituser-search-history-widget.php:98
Maintenance & Trust

User Recent Search History Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedApr 10, 2014
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

User Recent Search History Developer Profile

Dipali Dhole

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect User Recent Search History

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
widget_your_search
Data Attributes
your-searches-titleyour-searches-number
JS Globals
ursh_init_sessionursh_initursh_create_search_tableursh_save_searchursh_register_widgetsUser_Search_History_Widget+3 more
FAQ

Frequently Asked Questions about User Recent Search History