User Toolkit Security & Risk Analysis

wordpress.org/plugins/user-toolkit

The missing user tools and activity data that you need and don't have by default.

100 active installs v1.2.4 PHP 7.4+ WP 5.9.5+ Updated Oct 28, 2024
disable-userlast-loginregistration-dateuser-profile
90
A · Safe
CVEs total1
Unpatched0
Last CVEOct 25, 2024
Safety Verdict

Is User Toolkit Safe to Use in 2026?

Generally Safe

Score 90/100

User Toolkit has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Oct 25, 2024Updated 1yr ago
Risk Assessment

The 'user-toolkit' plugin v1.2.4 exhibits a generally strong security posture based on the provided static analysis. The complete absence of an identifiable attack surface (AJAX handlers, REST API routes, shortcodes, cron events) is a significant strength, indicating that the plugin does not expose easily exploitable entry points. Furthermore, the code shows excellent adherence to secure coding practices with 100% of SQL queries using prepared statements and 97% of output being properly escaped, minimizing risks of SQL injection and XSS vulnerabilities. The presence of nonce and capability checks, though not universal across all potential entry points (which are absent), demonstrates an awareness of authorization and security tokens.

However, the plugin's vulnerability history presents a notable concern. The fact that it has a known CVE, specifically an 'Authentication Bypass Using an Alternate Path or Channel' vulnerability, even if currently patched, suggests a historical weakness in how it handles user authentication or authorization. The timing of the last vulnerability (2024-10-25) also indicates that it was a relatively recent issue. While the static analysis reveals no *currently* exploitable vulnerabilities within this version's code, the past incident warrants caution and highlights a potential for similar issues to re-emerge if not meticulously addressed.

In conclusion, 'user-toolkit' v1.2.4 is commendable for its minimal attack surface and robust secure coding practices in areas like SQL and output escaping. However, the historical presence of a significant vulnerability type like authentication bypass cannot be ignored. Users should remain vigilant and ensure they are always using the latest patched versions, as past vulnerabilities, even if fixed, indicate areas that require careful scrutiny and ongoing maintenance.

Key Concerns

  • 1 known high severity CVE historically
Vulnerabilities
1

User Toolkit Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

CVE-2024-9890high · 8.8Authentication Bypass Using an Alternate Path or Channel

User Toolkit <= 1.2.3 - Authenticated (Subscriber+) Authentication Bypass

Oct 25, 2024 Patched in 1.2.4 (49d)
Code Analysis
Analyzed Mar 16, 2026

User Toolkit Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
36 escaped
Nonce Checks
4
Capability Checks
8
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

97% escaped37 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<UserSwitch> (src\UserSwitch.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

User Toolkit Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 26
filtermanage_users_columnssrc\Admin.php:14
filtermanage_users_custom_columnsrc\Admin.php:15
filtermanage_users_sortable_columnssrc\Admin.php:16
actionpre_get_userssrc\Admin.php:17
actionmanage_users_extra_tablenavsrc\Admin.php:18
actionpre_get_userssrc\Admin.php:19
actionedit_user_profilesrc\Admin.php:20
actionshow_user_profilesrc\Admin.php:21
actionpersonal_options_updatesrc\Admin.php:22
actionedit_user_profile_updatesrc\Admin.php:23
filterauthenticatesrc\Authentication.php:12
actionuser_registersrc\Authentication.php:13
actionwp_loginsrc\Authentication.php:14
actionrest_api_initsrc\RestEndpoints.php:12
actionrest_api_initsrc\RestEndpoints.php:13
filterrest_user_collection_paramssrc\RestEndpoints.php:14
filterrest_user_querysrc\RestEndpoints.php:15
filteruser_row_actionssrc\UserSwitch.php:14
actioninitsrc\UserSwitch.php:15
actioninitsrc\UserSwitch.php:16
actionadmin_noticessrc\UserSwitch.php:17
actionwp_footersrc\UserSwitch.php:18
actionadmin_bar_menusrc\UserSwitch.php:19
actionusrtk_after_profile_settingssrc\UserSwitch.php:20
actionadmin_enqueue_scriptssrc\UserTools.php:19
actionwp_enqueue_scriptssrc\UserTools.php:20
Maintenance & Trust

User Toolkit Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedOct 28, 2024
PHP min version7.4
Downloads3K

Community Trust

Rating100/100
Number of ratings4
Active installs100
Developer Profile

User Toolkit Developer Profile

Deryck

3 plugins · 400 total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
93 days
View full developer profile
Detection Fingerprints

How We Detect User Toolkit

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/user-toolkit/assets/dist/app.css/wp-content/plugins/user-toolkit/assets/dist/app.js
Script Paths
/wp-content/plugins/user-toolkit/assets/dist/app.js
Version Parameters
user-toolkit/assets/dist/app.css?ver=user-toolkit/assets/dist/app.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-usrtk-user-switch-ref
JS Globals
USRTK_VERSION
REST Endpoints
/wp-json/user-toolkit/
FAQ

Frequently Asked Questions about User Toolkit