User Shortcodes Security & Risk Analysis

wordpress.org/plugins/user-shortcodes

Add a simple list of shortcodes to WordPress in order to display the current user information.

1K active installs v1.0.1 PHP + WP 3.0.1+ Updated Apr 2, 2015
useruser-informationuser-shortcodes
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is User Shortcodes Safe to Use in 2026?

Generally Safe

Score 85/100

User Shortcodes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "user-shortcodes" plugin v1.0.1 exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, proper use of prepared statements for all SQL queries, and 100% output escaping indicate diligent secure coding practices. Furthermore, the lack of file operations and external HTTP requests minimizes potential attack vectors. The plugin also scores well on authentication and authorization, with no identified unprotected entry points, nonce checks, or capability checks that are a common source of vulnerabilities in WordPress plugins.

However, the analysis does highlight some areas that, while not demonstrating active vulnerabilities in this version, represent potential risks that could be exploited if the plugin evolves. The presence of six shortcodes as entry points, even without direct authentication checks listed in the report, means that any flaws within these shortcodes themselves could be a pathway for attackers. The absence of recorded vulnerabilities in its history is positive, suggesting the developers have historically maintained a secure codebase. Nevertheless, this history, combined with the potential for issues within the shortcodes, warrants continued vigilance.

Key Concerns

  • Shortcodes as potential entry points without explicit auth checks
  • No recorded nonce checks for entry points
  • No recorded capability checks for entry points
Vulnerabilities
None known

User Shortcodes Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

User Shortcodes Release Timeline

v1.0.1Current
v1.0.0
Code Analysis
Analyzed Mar 16, 2026

User Shortcodes Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

User Shortcodes Attack Surface

Entry Points6
Unprotected0

Shortcodes 6

[currentuser_username] core\shortcodes.php:19
[currentuser_useremail] core\shortcodes.php:20
[currentuser_firstname] core\shortcodes.php:21
[currentuser_lastname] core\shortcodes.php:22
[currentuser_displayname] core\shortcodes.php:23
[currentuser_id] core\shortcodes.php:24
Maintenance & Trust

User Shortcodes Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedApr 2, 2015
PHP min version
Downloads18K

Community Trust

Rating100/100
Number of ratings12
Active installs1K
Developer Profile

User Shortcodes Developer Profile

HappyPlugins

6 plugins · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect User Shortcodes

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[currentuser_username][currentuser_useremail][currentuser_firstname][currentuser_lastname]
FAQ

Frequently Asked Questions about User Shortcodes