
User Timer Security & Risk Analysis
wordpress.org/plugins/user-timerTracks the activity of logged-in users by measuring how long their browser stays active on the site.
Is User Timer Safe to Use in 2026?
Generally Safe
Score 100/100User Timer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The user-timer plugin v0.1.3 exhibits a mixed security posture, with some strong security practices but significant vulnerabilities in its attack surface. The plugin demonstrates excellent adherence to secure coding standards by using prepared statements for all SQL queries and properly escaping all output. File operations and external HTTP requests are also present, but their context within the static analysis is not detailed enough to assess risk without further review. The absence of any recorded vulnerabilities in its history is a positive indicator of its current state. However, the plugin's attack surface is a major concern. It exposes two AJAX handlers, both of which lack authentication checks. This is a critical security flaw, as it allows any unauthenticated user to interact with these endpoints, potentially leading to unintended actions or information disclosure.
While the code signals are generally positive, indicating good practices like the use of nonces and capability checks (albeit only one of each is identified), the two unprotected AJAX handlers represent a significant risk. The taint analysis shows no identified flows, which is good, but this might be due to the limited scope of the analysis or the nature of the plugin's functionality. The lack of any known CVEs is reassuring, but it does not negate the inherent risks presented by the unprotected entry points. In conclusion, the user-timer plugin v0.1.3 has a strong foundation in secure coding for its database and output handling, but its unauthenticated AJAX endpoints create a critical security weakness that must be addressed immediately. The plugin's vulnerability history suggests a relatively clean past, but the current static analysis reveals a clear and present danger.
Key Concerns
- Unprotected AJAX handlers
- Two AJAX handlers without auth checks
User Timer Security Vulnerabilities
User Timer Code Analysis
SQL Query Safety
Output Escaping
User Timer Attack Surface
AJAX Handlers 2
WordPress Hooks 33
Maintenance & Trust
User Timer Maintenance & Trust
Maintenance Signals
Community Trust
User Timer Alternatives
Open Web Analytics for WordPress
open-web-analytics
The official plugin for integrating Open Web Analytics with WordPress based web sites and applications.
3WART Content Performance Heatmap Light
3wart-content-performance-heatmap-light
A lightweight plugin to visualize user interactions on your site with heatmaps, including clicks, mouse movements, and scroll depth.
Activity Monitor Pro
activity-monitor-pro
Comprehensive activity monitoring, undo system, and AI-powered anomaly detection for WordPress.
Site Kit by Google – Analytics, Search Console, AdSense, Speed
google-site-kit
Site Kit is a one-stop solution for WordPress users to use everything Google has to offer to make them successful on the web.
MonsterInsights – Google Analytics Dashboard for WordPress (Website Stats Made Easy)
google-analytics-for-wordpress
The best free Google Analytics plugin for WordPress. See how visitors find and use your website so you can grow your business with powerful analytics.
User Timer Developer Profile
5 plugins · 6K total installs
How We Detect User Timer
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/user-timer/css/admin.css/wp-content/plugins/user-timer/js/data.js/wp-content/plugins/user-timer/js/download.js/wp-content/plugins/user-timer/js/log.js/wp-content/plugins/user-timer/js/caller.jsHTML / DOM Fingerprints
data-ut-user-iddata-ut-actiondata-ut-tick-intervaldata-ut-urluserTimerLoguserTimerCaller/wp-json/user-timer/v1/log