User Specific Content Security & Risk Analysis

wordpress.org/plugins/user-specific-content

This Plugin allows you to select specific users by user name, or by role name who can view a specific post content or page content.

1K active installs v1.0.6 PHP + WP 2.9.2+ Updated Nov 28, 2017
content-by-rolecontent-by-useruser-contentuser-specific-content
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEDec 31, 2025
Safety Verdict

Is User Specific Content Safe to Use in 2026?

Use With Caution

Score 63/100

User Specific Content has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Dec 31, 2025Updated 8yr ago
Risk Assessment

The user-specific-content plugin, version 1.0.6, exhibits a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries, having a single nonce check, and a single capability check, indicating some awareness of security fundamentals. There are no observed dangerous functions, file operations, or external HTTP requests, which are common vectors for exploits. However, a significant concern is the low percentage (35%) of properly escaped output, leaving 65% of outputs potentially vulnerable to Cross-Site Scripting (XSS) attacks, especially given the plugin's focus on content manipulation. The static analysis indicates an attack surface primarily consisting of shortcodes, with no unprotected entry points detected, which is a strength.

The vulnerability history is a critical red flag. The presence of one unpatched medium severity CVE, specifically an XSS vulnerability, strongly suggests that the current version may still be susceptible to this known issue. The fact that the last vulnerability was recorded on December 31, 2025, and is still unpatched is highly concerning and implies a lack of ongoing maintenance and timely security updates. This pattern indicates a potential for recurring vulnerabilities if the development practices do not improve.

In conclusion, while the plugin has some foundational security strengths like secure SQL handling, the high proportion of unescaped output and the single unpatched XSS vulnerability significantly elevate the risk. The plugin is not recommended for production environments without addressing the unescaped output issue and, more importantly, applying the patch for the known CVE. The lack of taint flow analysis being performed might also be a missed opportunity to identify deeper vulnerabilities.

Key Concerns

  • Unpatched medium CVE (XSS)
  • Low proper output escaping percentage (35%)
Vulnerabilities
1

User Specific Content Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-62749medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

User Specific Content <= 1.0.6 - Authenticated (Contributor+) Stored Cross-Site Scripting

Dec 31, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

User Specific Content Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
44
24 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

35% escaped68 total outputs
Attack Surface

User Specific Content Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[O_U] User-Specific-Content.php:81
WordPress Hooks 11
actionadmin_menupanel\Simple_Panel_class.php:180
actionadmin_initpanel\Simple_Panel_class.php:183
filterwp_handle_upload_prefilterpanel\Simple_Panel_class.php:186
filteradmin_footerpanel\Simple_Panel_class.php:507
actionadmin_footerpanel\Simple_Panel_class.php:649
actioninitUser-Specific-Content.php:77
actionsave_postUser-Specific-Content.php:79
actionadd_meta_boxesUser-Specific-Content.php:97
filterthe_contentUser-Specific-Content.php:112
filterthe_excerptUser-Specific-Content.php:116
actioninitUser-Specific-Content.php:529
Maintenance & Trust

User Specific Content Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.0
Last updatedNov 28, 2017
PHP min version
Downloads97K

Community Trust

Rating86/100
Number of ratings36
Active installs1K
Alternatives

User Specific Content Alternatives

No alternatives data available yet.

Developer Profile

User Specific Content Developer Profile

Bainternet

19 plugins · 9K total installs

83
trust score
Avg Security Score
84/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect User Specific Content

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/user-specific-content/js/bainternet_usc.js/wp-content/plugins/user-specific-content/css/bainternet_usc.css
Script Paths
/wp-content/plugins/user-specific-content/js/bainternet_usc.js
Version Parameters
user-specific-content/js/bainternet_usc.js?ver=user-specific-content/css/bainternet_usc.css?ver=

HTML / DOM Fingerprints

CSS Classes
clearselection_usc
Data Attributes
name="U_S_C_roles[]"name="U_S_C_users[]"name="U_S_C_options"
Shortcode Output
[O_U]
FAQ

Frequently Asked Questions about User Specific Content