User Status Manager Security & Risk Analysis

wordpress.org/plugins/user-status-manager

User Status Manager is a plugin where user account can be set to Active or Inactive permanently or for certain period of time

10 active installs v2.1.2 PHP + WP 3.3+ Updated May 25, 2014
user-status-manager
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is User Status Manager Safe to Use in 2026?

Generally Safe

Score 85/100

User Status Manager has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The User Status Manager v2.1.2 plugin presents a mixed security picture. On one hand, its attack surface appears to be minimal with no direct entry points like AJAX handlers, REST API routes, or shortcodes found during static analysis. This suggests a limited exposure to external attacks. Furthermore, the plugin has no recorded vulnerability history, which is a positive indicator of its past security. However, the code analysis reveals significant concerns. The plugin uses 13 SQL queries, with only 8% employing prepared statements, leaving a substantial portion vulnerable to SQL injection. Critically, taint analysis identified one high-severity flow with unsanitized paths, indicating a potential for malicious data to be processed without proper validation. Compounding these issues, none of the identified outputs are properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is ever displayed without sanitization. The complete absence of nonce and capability checks, while not directly tied to an attack surface, raises concerns about authorization and integrity if any entry points were to be discovered or introduced in the future. In conclusion, while the lack of a known attack surface and vulnerability history are strengths, the prevalent use of raw SQL, unsanitized taint flows, and unescaped output represent critical weaknesses that demand immediate attention.

Key Concerns

  • SQL queries not using prepared statements
  • High severity taint flow with unsanitized paths
  • Output not properly escaped
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

User Status Manager Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

User Status Manager Code Analysis

Dangerous Functions
0
Raw SQL Queries
12
1 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

8% prepared13 total queries

Output Escaping

0% escaped2 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
<manage_user> (manage_user.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

User Status Manager Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actiondelete_userstart.php:23
actionwp_loginstart.php:72
filterlogin_messagestart.php:84
actionadmin_menustart.php:91
actionuser_registerstart.php:154
Maintenance & Trust

User Status Manager Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedMay 25, 2014
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Alternatives

User Status Manager Alternatives

No alternatives data available yet.

Developer Profile

User Status Manager Developer Profile

Rahul Balakrishna

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect User Status Manager

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/user-status-manager/css/jquery-ui.css

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about User Status Manager