Accessibility by UserWay Security & Risk Analysis

wordpress.org/plugins/userway-accessibility-widget

UserWay’s Accessibility Widget creates a simpler and more accessible browsing experience for your users.

80K active installs v2.6.6 PHP + WP 4.7+ Updated Dec 8, 2025
accessibilityadaeaa-compliancesection-508wcag
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Accessibility by UserWay Safe to Use in 2026?

Generally Safe

Score 100/100

Accessibility by UserWay has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The userway-accessibility-widget plugin version 2.6.6 exhibits a mixed security posture. On the positive side, the static analysis reveals a remarkably small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are accessible without authentication. Furthermore, there are no known vulnerabilities (CVEs) associated with this plugin, and it does not appear to bundle outdated libraries. This indicates a generally good approach to minimizing entry points and a lack of publicly disclosed security flaws.

However, several concerning code signals warrant attention. A significant portion of SQL queries (86%) are not using prepared statements, posing a risk of SQL injection if these queries are constructed with user-supplied data. Crucially, none of the identified output points are properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if dynamic content is displayed without sanitization. The taint analysis also detected two flows with unsanitized paths, indicating a potential for directory traversal or similar file-related attacks, although these were not classified as critical or high severity. The absence of nonce checks on AJAX handlers (though there are none) and limited capability checks also represent potential areas for further hardening.

In conclusion, while the plugin benefits from a minimal attack surface and a clean vulnerability history, the prevalent lack of proper output escaping and the high rate of un-prepared SQL queries represent significant, actionable security risks. The taint analysis, while not critical, further highlights areas where input validation and sanitization need to be more robust. Developers should prioritize addressing the unescaped output and raw SQL queries to improve the overall security of the plugin.

Key Concerns

  • SQL queries not using prepared statements
  • Output escaping is not properly implemented
  • Taint flows with unsanitized paths
  • Limited capability checks
Vulnerabilities
None known

Accessibility by UserWay Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Accessibility by UserWay Code Analysis

Dangerous Functions
0
Raw SQL Queries
6
1 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

14% prepared7 total queries

Output Escaping

0% escaped4 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
getRemoteUwAccountId (includes\functions.php:49)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Accessibility by UserWay Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_menuincludes\admin.php:14
actionrest_api_initincludes\controller.php:187
filterplugin_row_metaincludes\notifications.php:2
actionadmin_enqueue_scriptsincludes\notifications.php:21
actionadmin_enqueue_scriptsincludes\notifications.php:27
actionadmin_noticesincludes\notifications.php:48
actionadmin_footerincludes\notifications.php:77
actionwp_footeruserway.php:82
Maintenance & Trust

Accessibility by UserWay Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 8, 2025
PHP min version
Downloads918K

Community Trust

Rating80/100
Number of ratings56
Active installs80K
Developer Profile

Accessibility by UserWay Developer Profile

UserWay

2 plugins · 100K total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Accessibility by UserWay

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/userway-accessibility-widget/assets/css/style.css
Script Paths
https://cdn.userway.org/widget.js/wp-content/plugins/userway-accessibility-widget/includes/api-script.js
Version Parameters
userway-accessibility-widget/assets/css/style.css?ver=userway-accessibility-widget/includes/api-script.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-account
JS Globals
eldocument
FAQ

Frequently Asked Questions about Accessibility by UserWay