Usher Security & Risk Analysis

wordpress.org/plugins/usher

Adds keyboard shortcuts for navigating around the WordPress admin.

0 active installs v1.0.1 PHP 7.0+ WP 5.0+ Updated Jul 1, 2021
adminkeyboardnavigationshortcuts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Usher Safe to Use in 2026?

Generally Safe

Score 85/100

Usher has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "usher" v1.0.1 plugin exhibits an excellent security posture based on the provided static analysis. The plugin has no apparent attack surface, meaning there are no AJAX handlers, REST API routes, shortcodes, or cron events that could be exploited. Furthermore, the code signals are highly positive, with no dangerous functions identified, all SQL queries using prepared statements, and a very high percentage of properly escaped output. The absence of file operations, external HTTP requests, and the presence of capability checks indicate good development practices for securing functionalities.

The taint analysis shows zero flows, suggesting that user input is not being processed in a way that could lead to vulnerabilities like code injection or path traversal. The plugin's vulnerability history is also clean, with no recorded CVEs, indicating a history of secure development or a lack of targeted exploitation.

Overall, "usher" v1.0.1 appears to be a very secure plugin. The strengths lie in its minimal attack surface, robust coding practices regarding SQL and output sanitization, and a complete lack of identified vulnerabilities. The only minor observation is the absence of nonce checks, which is generally a good practice for AJAX handlers, though in this case, there are no AJAX handlers to secure. The absence of known vulnerabilities and taint flows further bolsters confidence in its security.

Key Concerns

  • No nonce checks found
Vulnerabilities
None known

Usher Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Usher Release Timeline

v1.0.1Current
v1.0.0
Code Analysis
Analyzed Mar 17, 2026

Usher Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
34 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

89% escaped38 total outputs
Attack Surface

Usher Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_noticesincludes\class-usher.php:133
actionadmin_enqueue_scriptsincludes\core\class-assets.php:28
actioncurrent_screenincludes\core\class-render-dialog.php:36
actionadmin_headincludes\core\class-render-dialog.php:37
actionadmin_enqueue_scriptsincludes\core\class-render-dialog.php:39
actionadmin_headusher.php:119
Maintenance & Trust

Usher Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedJul 1, 2021
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Usher Developer Profile

Drew Jaynes

7 plugins · 4K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Usher

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/usher/assets/js/usher.js
Script Paths
/wp-content/plugins/usher/assets/js/usher.js
Version Parameters
usher/assets/js/usher.js?ver=

HTML / DOM Fingerprints

CSS Classes
usher-reqsusher-reqs-row
Data Attributes
data-plugin="usher/usher.php"
FAQ

Frequently Asked Questions about Usher