Userback Security & Risk Analysis

wordpress.org/plugins/userback

Userback is a powerful visual feedback tool that makes it easy to collect website feedback, report bugs, and collaborate with your team—all from your …

2K active installs v1.0.17 PHP 7.4+ WP 3.5.0+ Updated Dec 24, 2025
bug-trackingfeedbacksurveys
76
B · Generally Safe
CVEs total2
Unpatched1
Last CVEDec 12, 2025
Safety Verdict

Is Userback Safe to Use in 2026?

Mostly Safe

Score 76/100

Userback is generally safe to use. 2 past CVEs were resolved. Keep it updated.

2 known CVEs 1 unpatched Last CVE: Dec 12, 2025Updated 3mo ago
Risk Assessment

The Userback plugin v1.0.17 exhibits a mixed security posture. On the positive side, the static analysis reveals a relatively small attack surface consisting of only two AJAX handlers, and importantly, none of these entry points appear to be unprotected by authentication checks. The presence of nonce and capability checks on these handlers further strengthens the access control mechanisms. The code also demonstrates good practices by utilizing prepared statements for the majority of its SQL queries and shows an effort towards output escaping, although not universally applied.

However, the vulnerability history presents a significant concern. With two known CVEs and one remaining unpatched, including two medium severity vulnerabilities, the plugin has a track record of security flaws. The common vulnerability types of Missing Authorization and Cross-Site Request Forgery (CSRF) are particularly worrying as they directly relate to how the plugin handles user actions and data. The fact that the last vulnerability was so recent (2025-12-12) suggests a continued pattern of issues that are not being fully addressed.

In conclusion, while the current static analysis shows some positive security indicators like protected entry points and good SQL practices, the historical vulnerability data overshadows these strengths. The presence of unpatched medium severity vulnerabilities, especially those related to authorization and CSRF, indicates a critical need for immediate attention. Users should be wary of the potential for exploitation given this history, and developers should prioritize fixing the existing CVEs and implementing more robust, universal sanitization and escaping.

Key Concerns

  • Unpatched CVE: 2
  • Medium severity CVEs: 2
  • Output escaping: 56% properly escaped
  • SQL queries: 33% not using prepared statements
Vulnerabilities
2

Userback Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2025-14540medium · 4.3Missing Authorization

Userback <= 1.0.15 - Missing Authorization to Authenticated (Subscriber+) Plugin's Configuration Exposure

Dec 12, 2025Unpatched
CVE-2023-46089medium · 4.3Cross-Site Request Forgery (CSRF)

Userback <= 1.0.13 - Cross-Site Request Forgery

Oct 17, 2023 Patched in 1.0.14 (98d)
Code Analysis
Analyzed Mar 16, 2026

Userback Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
2 prepared
Unescaped Output
4
5 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

67% prepared3 total queries

Output Escaping

56% escaped9 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<index> (index.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Userback Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_get_userbackindex.php:20
authwp_ajax_save_userbackindex.php:21
WordPress Hooks 3
actionadmin_menuindex.php:18
actionadmin_enqueue_scriptsindex.php:19
actionwp_footerindex.php:22
Maintenance & Trust

Userback Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 24, 2025
PHP min version7.4
Downloads39K

Community Trust

Rating72/100
Number of ratings9
Active installs2K
Developer Profile

Userback Developer Profile

userback

1 plugin · 2K total installs

62
trust score
Avg Security Score
76/100
Avg Patch Time
98 days
View full developer profile
Detection Fingerprints

How We Detect Userback

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/userback/assets/logo.png
Script Paths
https://static.userback.io/widget/v1.js
Version Parameters
/userback/javascript/admin.js?ver=/userback/css/admin.css?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- Userback --><!-- END -->
Data Attributes
data-userback-access-token
JS Globals
UserbackUserbackAjax
REST Endpoints
/wp-json/wp/v2/pages
FAQ

Frequently Asked Questions about Userback